Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-14331 (GCVE-0-2020-14331)
Vulnerability from cvelistv5
Published
2020-09-15 18:51
Modified
2024-08-04 12:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A flaw was found in the Linux kernel’s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Linux Kernel |
Version: All versions of the Linux kernel |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:39:36.257Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.openwall.com/lists/oss-security/2020/07/28/2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.openwall.net/linux-kernel/2020/07/29/234" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858679" }, { "name": "[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html" }, { "name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html" }, { "name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Linux Kernel", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All versions of the Linux kernel" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in the Linux kernel\u2019s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-31T17:06:10", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.openwall.com/lists/oss-security/2020/07/28/2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.openwall.net/linux-kernel/2020/07/29/234" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858679" }, { "name": "[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html" }, { "name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html" }, { "name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-14331", "datePublished": "2020-09-15T18:51:10", "dateReserved": "2020-06-17T00:00:00", "dateUpdated": "2024-08-04T12:39:36.257Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-14331\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2020-09-15T19:15:12.667\",\"lastModified\":\"2024-11-21T05:03:01.643\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in the Linux kernel\u2019s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 un fallo en la implementaci\u00f3n del kernel de Linux del c\u00f3digo de video invertido en consolas VGA cuando un atacante local intenta cambiar el tama\u00f1o de la consola, llamando un ioctl VT_RESIZE, lo que causa una escritura fuera de l\u00edmites.\u0026#xa0;Este fallo permite a un usuario local con acceso a la consola VGA bloquear el sistema, escalando potencialmente sus privilegios en el sistema.\u0026#xa0;La mayor amenaza de esta vulnerabilidad es la confidencialidad e integridad de los datos, as\u00ed como la disponibilidad del sistema\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.6,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.7,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.7.19\",\"matchCriteriaId\":\"72E6465E-D745-4617-A1EC-B881A2A3BB6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.8.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"937239B6-1959-4099-AA57-039A3A661BE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.8.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"36DDFE55-065B-4549-A2EF-4F3C3015C7E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.8.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A8D373F-782F-41EC-AAC9-BB62BE3FDC00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.8.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"5595D162-7A55-4223-9A78-7AAEFDA5B8D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.8.0:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"49E44009-A5C4-411E-B457-3634AFC4049C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.8.0:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C34E334-530F-47D2-BEB4-1FAAB75B4401\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1858679\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.openwall.net/linux-kernel/2020/07/29/234\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.openwall.com/lists/oss-security/2020/07/28/2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1858679\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.openwall.net/linux-kernel/2020/07/29/234\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.openwall.com/lists/oss-security/2020/07/28/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]}]}}" } }
opensuse-su-2020:1153-1
Vulnerability from csaf_opensuse
Published
2020-08-06 10:21
Modified
2020-08-06 10:21
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c where it did not check the length of variable elements in a beacon head, leading to a buffer overflow (bnc#1152107 1173659).
- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).
- CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-10766: Fixed rogue cross-process SSBD shutdown. Linux scheduler logical bug allowed an attacker to turn off the SSBD protection. (bnc#1172781).
- CVE-2020-10767: Fixed indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (bnc#1172782).
- CVE-2020-10768: Fixed indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).
- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).
- CVE-2020-10773: Fixed a kernel stack information leak on s390/s390x. (bnc#1172999).
- CVE-2020-10781: A zram sysfs resource consumption was fixed. (bnc#1173074).
- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).
- CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii was called several times in a row, aka CID-b86dab054059. (bnc#1172775).
- CVE-2020-14331: Fixed a buffer over write in vgacon_scroll (bnc#1174205).
- CVE-2020-14331: Fixed an out of bounds write to the vgacon scrollback buffer (bsc#1174205).
- CVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770 (bnc#1173514).
- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).
- CVE-2020-16166: The Linux kernel allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c (bnc#1174757).
The following non-security bugs were fixed:
- ACPI: GED: add support for _Exx / _Lxx handler methods (bsc#1111666).
- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (bsc#1111666).
- ACPI: NFIT: Fix unlock on error in scrub_show() (bsc#1171753).
- ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).
- ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).
- ACPI: video: Use native backlight on Acer Aspire 5783z (bsc#1111666).
- ACPI: video: Use native backlight on Acer TravelMate 5735Z (bsc#1111666).
- ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).
- ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).
- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (bsc#1111666).
- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).
- ALSA: hda/hdmi - enable runtime pm for newer AMD display audio (bsc#1111666).
- ALSA: hda - let hs_mic be picked ahead of hp_mic (bsc#1111666).
- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (bsc#1111666).
- ALSA: hda/realtek - Add LED class support for micmute LED (bsc#1111666).
- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (bsc#1111666).
- ALSA: hda/realtek - Add quirk for Lenovo Carbon X1 8th gen (bsc#1111666).
- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (bsc#1111666).
- ALSA: hda/realtek - Add quirk for MSI GL63 (bsc#1111666).
- ALSA: hda/realtek - change to suitable link model for ASUS platform (bsc#1111666).
- ALSA: hda/realtek - Check headset type by unplug and resume (bsc#1111666).
- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (bsc#1111666).
- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (bsc#1111666).
- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (bsc#1111666).
- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (bsc#1111666).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (bsc#1111666).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (bsc#1111666).
- ALSA: hda/realtek - Enable micmute LED on and HP system (bsc#1111666).
- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (bsc#1111666).
- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (bsc#1111666).
- ALSA: hda/realtek: Fix add a 'ultra_low_power' function for intel reference board (alc256) (bsc#1111666).
- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (bsc#1111666).
- ALSA: hda/realtek - Fixed HP right speaker no sound (bsc#1111666).
- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (bsc#1111666).
- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).
- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (bsc#1111666).
- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (bsc#1111666).
- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).
- ALSA: lx6464es - add support for LX6464ESe pci express variant (bsc#1111666).
- ALSA: opl3: fix infoleak in opl3 (bsc#1111666).
- ALSA: pcm: disallow linking stream to itself (bsc#1111666).
- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (bsc#1111666).
- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (bsc#1111666).
- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (bsc#1111666).
- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (bsc#1111666).
- ALSA: usb-audio: Clean up quirk entries with macros (bsc#1111666).
- ALSA: usb-audio: Fix inconsistent card PM state after resume (bsc#1111666).
- ALSA: usb-audio: Fix packet size calculation (bsc#1111666).
- ALSA: usb-audio: Fix racy list management in output queue (bsc#1111666).
- ALSA: usb-audio: Improve frames size computation (bsc#1111666).
- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (bsc#1111666).
- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (bsc#1111666).
- amdgpu: a NULL ->mm does not mean a thread is a kthread (git-fixes).
- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12423).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (bsc#1111666).
- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (bsc#1111666).
- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (bsc#1111666).
- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (bsc#1111666).
- ax25: fix setsockopt(SO_BINDTODEVICE) (networking-stable-20_05_27).
- b43: Fix connection problem with WPA3 (bsc#1111666).
- b43_legacy: Fix connection problem with WPA3 (bsc#1111666).
- bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).
- be2net: fix link failure after ethtool offline test (git-fixes).
- block: Fix use-after-free in blkdev_get() (bsc#1174843).
- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).
- block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).
- block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).
- Bluetooth: Add SCO fallback for invalid LMP parameters error (bsc#1111666).
- bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).
- bnxt_en: Fix ethtool selftest crash under error conditions (git-fixes).
- bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE cmd fails (git-fixes).
- bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).
- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (git-fixes).
- bnxt_en: Fix VF anti-spoof filter setup (networking-stable-20_05_12).
- bnxt_en: Fix VLAN acceleration handling in bnxt_fix_features() (networking-stable-20_05_12).
- bnxt_en: Improve AER slot reset (networking-stable-20_05_12).
- brcmfmac: fix wrong location to get firmware feature (bsc#1111666).
- brcmfmac: Transform compatible string for FW loading (bsc#1169771).
- btrfs: add assertions for tree == inode->io_tree to extent IO helpers (bsc#1174438).
- btrfs: add new helper btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: Always use a cached extent_state in btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).
- btrfs: do not zero f_bavail if we have available space (bsc#1168081).
- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).
- btrfs: fix extent_state leak in btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).
- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).
- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).
- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).
- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).
- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).
- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).
- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).
- btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).
- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).
- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).
- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).
- btrfs: Return EAGAIN if we can't start no snpashot write in check_can_nocow (bsc#1174438).
- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).
- btrfs: Use newly introduced btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).
- bus: hisi_lpc: Add .remove method to avoid driver unbind crash (bsc#1174658).
- bus: hisi_lpc: Do not fail probe for unrecognised child devices (bsc#1174658).
- bus: hisi_lpc: Unregister logical PIO range to avoid potential use-after-free (bsc#1174658).
- bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads (bsc#1111666).
- carl9170: remove P2P_GO support (bsc#1111666).
- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- ceph: convert mdsc->cap_dirty to a per-session list (bsc#1167104).
- ceph: request expedited service on session's last cap flush (bsc#1167104).
- cgroup, blkcg: Prepare some symbols for module and !CONFIG_CGROUP usages (bsc#1173857).
- char/random: Add a newline at the end of the file (jsc#SLE-12423).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).
- clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).
- clk: clk-flexgen: fix clock-critical handling (bsc#1051510).
- clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).
- clocksource: dw_apb_timer: Make CPU-affiliation being optional (bsc#1111666).
- compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).
- compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).
- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1174549
- copy_{to,from}_user(): consolidate object size checks (git fixes).
- crypto: algboss - do not wait during notifier callback (bsc#1111666).
- crypto: algif_skcipher - Cap recv SG list at ctx->used (bsc#1111666).
- crypto: caam - update xts sector size for large input length (bsc#1111666).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (bsc#1111666).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).
- crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).
- crypto: chelsio/chtls: properly set tp->lsndtime (bsc#1111666).
- crypto: rockchip - fix scatterlist nents error (git-fixes).
- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).
- crypto: talitos - check AES key size (git-fixes).
- crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK (git-fixes).
- crypto: talitos - fix IPsec cipher in length (git-fixes).
- crypto: talitos - reorder code in talitos_edesc_alloc() (git-fixes).
- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).
- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).
- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).
- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).
- dlm: remove BUG() before panic() (bsc#1174844).
- dmaengine: tegra210-adma: Fix an error handling path in 'tegra_adma_probe()' (bsc#1111666).
- dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).
- dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).
- dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).
- dm: fix potential for q->make_request_fn NULL pointer (git fixes (block drivers)).
- dm space map common: fix to ensure new block isn't already in use (git fixes (block drivers)).
- dm: various cleanups to md->queue initialization code (git fixes).
- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).
- dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).
- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).
- driver-core, libnvdimm: Let device subsystems add local lockdep coverage (bsc#1171753)
- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617, bsc#1170618).
- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).
- drm: amd/display: fix Kconfig help text (bsc#1113956) * only fix DEBUG_KERNEL_DC
- drm: bridge: adv7511: Extend list of audio sample rates (bsc#1111666).
- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1113956) * context changes
- drm: encoder_slave: fix refcouting error for modules (bsc#1111666).
- drm: encoder_slave: fix refcouting error for modules (bsc#1114279)
- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1112178)
- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (bsc#1111666).
- drm/mediatek: Check plane visibility in atomic_update (bsc#1113956) * context changes
- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1111666).
- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (bsc#1111666).
- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (bsc#1111666).
- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1113956)
- drm/radeon: fix double free (bsc#1113956)
- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1113956)
- drm/sun4i: hdmi ddc clk: Fix size of m divider (bsc#1111666).
- drm/tegra: hub: Do not enable orphaned window group (bsc#1111666).
- drm/vkms: Hold gem object while still in-use (bsc#1113956) * context changes
- e1000: Distribute switch variables for initialization (bsc#1111666).
- e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).
- e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).
- e1000e: Relax condition to trigger reset for ME workaround (bsc#1111666).
- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).
- efi/memreserve: deal with memreserve entries in unmapped memory (bsc#1174685).
- efi/random: Increase size of firmware supplied randomness (jsc#SLE-12423).
- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12423).
- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12423).
- efi: Reorder pr_notice() with add_device_randomness() call (jsc#SLE-12423).
- evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).
- evm: Fix a small race in init_desc() (bsc#1051510).
- ext4: fix a data race at inode->i_blocks (bsc#1171835).
- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1174840).
- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).
- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).
- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).
- extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (bsc#1051510).
- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).
- fat: do not allow to mount if the FAT length == 0 (bsc#1174845).
- fdt: add support for rng-seed (jsc#SLE-12423).
- fdt: Update CRC check for rng-seed (jsc#SLE-12423).
- firmware: imx: scu: Fix corruption of header (git-fixes).
- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (bsc#1111666).
- fix multiplication overflow in copy_fdtable() (bsc#1173825).
- Fix Patch-mainline tag in the previous zram fix patch
- fpga: dfl: fix bug in port reset handshake (git-fixes).
- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).
- gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).
- gpu: host1x: Detach driver on unregister (bsc#1111666).
- gpu: ipu-v3: pre: do not trigger update if buffer address does not change (bsc#1111666).
- HID: hiddev: fix mess in hiddev_open() (git-fixes).
- HID: magicmouse: do not set up autorepeat (git-fixes).
- HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).
- HISI LPC: Re-Add ACPI child enumeration support (bsc#1174658).
- HISI LPC: Stop using MFD APIs (bsc#1174658).
- hv_netvsc: Fix netvsc_start_xmit's return type (git-fixes).
- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (bsc#1111666).
- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (bsc#1111666).
- hwmon: (max6697) Make sure the OVERT mask is set correctly (bsc#1111666).
- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (bsc#1111666).
- i2c: eg20t: Load module automatically if ID matches (bsc#1111666).
- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (bsc#1111666).
- i40e: reduce stack usage in i40e_set_fc (git-fixes).
- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).
- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).
- iio:health:afe4404 Fix timestamp alignment and prevent data leak (bsc#1111666).
- iio:humidity:hdc100x Fix alignment and data leak issues (bsc#1111666).
- iio:magnetometer:ak8974: Fix alignment and data leak issues (bsc#1111666).
- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (bsc#1111666).
- iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).
- iio:pressure:ms5611 Fix buffer element alignment (bsc#1111666).
- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (bsc#1111666).
- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).
- ima: Fix ima digest hash table key calculation (bsc#1051510).
- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).
- input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (bsc#1111666).
- input: i8042 - Remove special PowerPC handling (git-fixes).
- input: synaptics - add a second working PNP_ID for Lenovo T470s (bsc#1111666).
- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).
- intel_th: Fix a NULL dereference when hub driver is not loaded (bsc#1111666).
- io-mapping: indicate mapping failure (git-fixes).
- ipvlan: call dev_change_flags when ipvlan mode is reset (git-fixes).
- ixgbevf: Remove limit of 10 entries for unicast filter list (git-fixes).
- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).
- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).
- kabi: hv: prevent struct device_node to become defined (bsc#1172871).
- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12423).
- kABI: protect struct mlx5_cmd_work_ent (kabi).
- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).
- kernfs: fix barrier usage in __kernfs_new_node() (bsc#1111666).
- kvm: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).
- kvm: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).
- kvm: x86: Fix APIC page invalidation race (bsc#1174122).
- kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).
- kvm: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).
- kvm: x86: only do L1TF workaround on affected processors (bsc#1171904).
- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).
- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).
- libceph: do not omit recovery_deletes in target_copy() (bsc#1174113).
- libceph: ignore pool overlay and cache logic on redirects (bsc#1173146).
- lib: logic_pio: Add logic_pio_unregister_range() (bsc#1174658).
- lib: logic_pio: Avoid possible overlap for unregistering regions (bsc#1174658).
- lib: logic_pio: Fix RCU usage (bsc#1174658).
- libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA deadlock (bsc#1171753).
- libnvdimm/bus: Prepare the nd_ioctl() path to be re-entrant (bsc#1171753).
- libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over __nd_ioctl() (bsc#1171753).
- libnvdimm: cover up changes in struct nvdimm_bus (bsc#1171753).
- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).
- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).
- libnvdimm/label: Remove the dpa align check (bsc#1171759).
- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).
- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).
- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).
- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).
- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).
- libnvdimm/region: Initialize bad block for volatile namespaces (bnc#1151927 5.3.6).
- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).
- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).
- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).
- livepatch: Disallow vmlinux.ko (bsc#1071995).
- livepatch: Make klp_apply_object_relocs static (bsc#1071995).
- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).
- livepatch: Remove .klp.arch (bsc#1071995).
- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).
- lpfc_debugfs: get rid of pointless access_ok() (bsc#1172687 bsc#1171530).
- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).
- mac80211: add option for setting control flags (bsc#1111666).
- mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for nl80211 TX (bsc#1111666).
- mailbox: imx: Disable the clock on devm_mbox_controller_register() failure (git-fixes).
- md: Avoid namespace collision with bitmap API (git fixes (block drivers)).
- mdraid: fix read/write bytes accounting (bsc#1172537).
- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (bsc#1166985)).
- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).
- media: si2157: Better check for running tuner in init (bsc#1111666).
- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered workqueue (git-fixes).
- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw workqueue (git-fixes).
- mlxsw: pci: Return error on PCI reset timeout (git-fixes).
- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).
- mlxsw: spectrum: Disallow prio-tagged packets when PVID is removed (git-fixes).
- mlxsw: spectrum_dpipe: Add missing error path (git-fixes).
- mlxsw: spectrum: Prevent force of 56G (git-fixes).
- mlxsw: spectrum_router: Refresh nexthop neighbour when it becomes dead (git-fixes).
- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (git-fixes).
- mlxsw: spectrum_switchdev: Add MDB entries in prepare phase (git-fixes).
- mlxsw: spectrum_switchdev: Do not treat static FDB entries as sticky (git-fixes).
- mmc: block: Fix request completion in the CQE timeout path (bsc#1111666).
- mmc: block: Fix use-after-free issue for rpmb (bsc#1111666).
- mmc: fix compilation of user API (bsc#1051510).
- mmc: sdhci: do not enable card detect interrupt for gpio cd type (bsc#1111666).
- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (bsc#1111666).
- Move kabi patch into the right place
- Move upstreamed lpfc patches into sorted section
- mvpp2: remove misleading comment (git-fixes).
- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).
- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).
- net/cxgb4: Check the return from t4_query_params properly (git-fixes).
- net: dsa: bcm_sf2: Fix node reference count (git-fixes).
- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).
- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).
- net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it (git-fixes).
- net: ena: add missing ethtool TX timestamping indication (git-fixes).
- net: ena: avoid memory access violation by validating req_id properly (git-fixes).
- net: ena: do not wake up tx queue when down (git-fixes).
- net: ena: ena-com.c: prevent NULL pointer dereference (git-fixes).
- net: ena: ethtool: use correct value for crc32 hash (git-fixes).
- net: ena: fix continuous keep-alive resets (git-fixes).
- net: ena: fix corruption of dev_idx_to_host_tbl (git-fixes).
- net: ena: fix default tx interrupt moderation interval (git-fixes).
- net: ena: fix incorrect default RSS key (git-fixes).
- net: ena: fix incorrectly saving queue numbers when setting RSS indirection table (git-fixes).
- net: ena: fix issues in setting interrupt moderation params in ethtool (git-fixes).
- net: ena: fix potential crash when rxfh key is NULL (git-fixes).
- net: ena: fix retrieval of nonadaptive interrupt moderation intervals (git-fixes).
- net: ena: fix uses of round_jiffies() (git-fixes).
- net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE (git-fixes).
- net: ena: reimplement set/get_coalesce() (git-fixes).
- net: ena: rss: do not allocate key when not supported (git-fixes).
- net: ena: rss: fix failure to get indirection table (git-fixes).
- net: ena: rss: store hash function as values and not bits (git-fixes).
- netfilter: connlabels: prefer static lock initialiser (git-fixes).
- netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).
- netfilter: not mark a spinlock as __read_mostly (git-fixes).
- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).
- net: hns3: add autoneg and change speed support for fibre port (bsc#1174070).
- net: hns3: add support for FEC encoding control (bsc#1174070).
- net: hns3: add support for multiple media type (bsc#1174070).
- net: hns3: fix a not link up issue when fibre port supports autoneg (bsc#1174070).
- net: hns3: fix for FEC configuration (bsc#1174070).
- net: hns3: fix port capbility updating issue (bsc#1174070).
- net: hns3: fix port setting handle for fibre port (bsc#1174070).
- net: hns3: fix selftest fail issue for fibre port with autoneg on (bsc#1174070).
- net: hns3: restore the MAC autoneg state after reset (bsc#1174070).
- net: inet_csk: Fix so_reuseport bind-address cache in tb->fast* (networking-stable-20_05_27).
- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).
- net: ipvlan: Fix ipvlan device tso disabled while NETIF_F_IP_CSUM is set (git-fixes).
- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).
- net/mlx4_core: drop useless LIST_HEAD (git-fixes).
- net/mlx4_core: fix a memory leak bug (git-fixes).
- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).
- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).
- net/mlx5: Avoid panic when setting vport rate (git-fixes).
- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).
- net/mlx5e: ethtool, Fix a typo in WOL function names (git-fixes).
- net/mlx5e: Fix traffic duplication in ethtool steering (git-fixes).
- net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).
- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).
- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).
- net/mlx5: Fix crash upon suspend/resume (networking-stable-20_06_07).
- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).
- net: mvmdio: allow up to four clocks to be specified for orion-mdio (git-fixes).
- net: mvpp2: prs: Do not override the sign bit in SRAM parser shift (git-fixes).
- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).
- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).
- net: qede: stop adding events on an already destroyed workqueue (git-fixes).
- net: qed: fix excessive QM ILT lines consumption (git-fixes).
- net: qed: fix NVMe login fails over VFs (git-fixes).
- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).
- net: revert 'net: get rid of an signed integer overflow in ip_idents_reserve()' (networking-stable-20_05_27).
- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).
- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).
- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).
- net: usb: qmi_wwan: add Telit 0x1050 composition (networking-stable-20_06_07).
- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).
- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).
- nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K (git-fixes).
- NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).
- NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).
- nilfs2: fix null pointer dereference at nilfs_segctor_do_construct() (bsc#1173857).
- nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type (bsc#1111666).
- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).
- nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).
- nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).
- nvme: fail cancelled commands with NVME_SC_HOST_PATH_ERROR (bsc#1158983 bsc#1172538).
- nvme-fc: Fail transport errors with NVME_SC_HOST_PATH (bsc#1158983 bsc#1172538).
- nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send failed (bsc#1158983 bsc#1172538).
- objtool: Clean instruction state before each function validation (bsc#1169514).
- objtool: Ignore empty alternatives (bsc#1169514).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: load global_inode_alloc (bsc#1172963).
- ocfs2: no need try to truncate file beyond i_size (bsc#1171841).
- overflow: Fix -Wtype-limits compilation warnings (git fixes).
- overflow.h: Add arithmetic shift helper (git fixes).
- p54usb: add AirVasT USB stick device-id (bsc#1051510).
- padata: ensure the reorder timer callback runs on the correct CPU (git-fixes).
- padata: reorder work kABI fixup (git-fixes).
- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).
- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).
- PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).
- PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).
- PCI: Fix 'try' semantics of bus and slot reset (git-fixes).
- PCI: Generalize multi-function power dependency device links (bsc#1111666).
- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871, bsc#1172872).
- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871, bsc#1172872).
- PCI: hv: Introduce hv_msi_entry (bsc#1172871, bsc#1172872).
- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871, bsc#1172872).
- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871, bsc#1172872).
- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871, bsc#1172872).
- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871, bsc#1172872).
- PCI: pciehp: Fix indefinite wait on sysfs requests (git-fixes).
- PCI: pciehp: Support interrupts sent from D3hot (git-fixes).
- PCI: Program MPS for RCiEP devices (bsc#1051510).
- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).
- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).
- pcm_native: result of put_user() needs to be checked (bsc#1111666).
- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).
- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).
- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).
- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).
- perf/x86/amd/iommu: Make the 'amd_iommu_attr_groups' symbol static (git-fixes).
- perf/x86/amd/uncore: Do not set 'ThreadMask' and 'SliceMask' for non-L3 PMCs (git-fixes stable).
- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).
- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).
- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).
- perf/x86: Fix incorrect PEBS_REGS (git-fixes).
- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).
- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).
- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).
- perf/x86/intel: Fix PT PMI handling (git-fixes).
- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).
- perf/x86/intel/uncore: Add Node ID mask (git-fixes).
- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).
- perf/x86/intel/uncore: Handle invalid event coding for free-running counter (git-fixes).
- perf/x86/uncore: Fix event group support (git-fixes).
- pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).
- pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (bsc#1051510).
- pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (bsc#1051510).
- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).
- platform/x86: dell-laptop: do not register micmute LED if there is no token (bsc#1111666).
- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (bsc#1111666).
- PM / Domains: Allow genpd users to specify default active wakeup behavior (git-fixes).
- pnp: Use list_for_each_entry() instead of open coding (git fixes).
- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).
- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).
- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).
- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).
- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).
- powerpc-mm-Remove-kvm-radix-prefetch-workaround-for-.patch
- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).
- powerpc-xmon-don-t-access-ASDR-in-VMs.patch
- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).
- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).
- power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (bsc#1051510).
- power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).
- power: vexpress: add suppress_bind_attrs to true (bsc#1111666).
- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).
- propagate_one(): mnt_set_mountpoint() needs mount_lock (bsc#1174841).
- qed: reduce maximum stack frame size (git-fixes).
- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).
- r8152: support additional Microsoft Surface Ethernet Adapter variant (networking-stable-20_05_27).
- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).
- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1111666)
- RDMA/efa: Set maximum pkeys device attribute (bsc#1111666)
- RDMA/efa: Support remote read access in MR registration (bsc#1111666)
- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1111666)
- README.BRANCH: Add Takashi Iwai as primary maintainer.
- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (bsc#1111666).
- Revert 'bcache: ignore pending signals when creating gc and allocator thread' (git fixes (block drivers)).
- Revert commit e918e570415c ('tpm_tis: Remove the HID IFX0102') (bsc#1111666).
- Revert 'dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues' (git fixes (block drivers)).
- Revert 'ipv6: add mtu lock check in __ip6_rt_update_pmtu' (networking-stable-20_05_16).
- Revert pciehp patches that broke booting (bsc#1174887)
- Revert 'thermal: mediatek: fix register index error' (bsc#1111666).
- Revert 'tools lib traceevent: Remove unneeded qsort and uses memmove'
- rtnetlink: Fix memory(net_device) leak when ->newlink fails (git-fixes).
- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).
- s390: fix syscall_get_error for compat processes (git-fixes).
- s390/qdio: consistently restore the IRQ handler (git-fixes).
- s390/qdio: lock device while installing IRQ handler (git-fixes).
- s390/qdio: put thinint indicator after early error (git-fixes).
- s390/qdio: tear down thinint indicator after early error (git-fixes).
- s390/qeth: fix error handling for isolation mode cmds (git-fixes).
- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).
- sch_sfq: validate silly quantum values (networking-stable-20_05_12).
- scripts/git_sort/git_sort.py: add bluetooth/bluetooth-next.git repository
- scsi: aacraid: fix a signedness bug (bsc#1174296).
- scsi: hisi_sas: fix calls to dma_set_mask_and_coherent() (bsc#1174296).
- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).
- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).
- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).
- scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix inconsistent indenting (bsc#1158983).
- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1158983).
- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1158983).
- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).
- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1158983).
- scsi: megaraid_sas: Fix a compilation warning (bsc#1174296).
- scsi: mpt3sas: Fix double free in attach error handling (bsc#1174296).
- scsi: qedf: Add port_id getter (bsc#1150660).
- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1174296).
- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).
- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).
- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).
- spi: dw: use 'smp_mb()' to avoid sending spi data error (bsc#1051510).
- spi: fix initial SPI_SR value in spi-fsl-dspi (bsc#1111666).
- spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).
- spi: spidev: fix a race between spidev_release and spidev_remove (bsc#1111666).
- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (bsc#1111666).
- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (bsc#1111666).
- staging: comedi: verify array index is correct before using it (bsc#1111666).
- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).
- staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).
- SUNRPC: The TCP back channel mustn't disappear while requests are outstanding (bsc#1152624).
- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).
- timers: Add a function to start/reduce a timer (networking-stable-20_05_27).
- tpm_tis: extra chip->ops check on error path in tpm_tis_core_init (bsc#1111666).
- tpm_tis: Remove the HID IFX0102 (bsc#1111666).
- tracing: Fix event trigger to accept redundant spaces (git-fixes).
- tty: hvc_console, fix crashes on parallel open/close (git-fixes).
- tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).
- tty: n_gsm: Fix SOF skipping (bsc#1051510).
- tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).
- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).
- ubifs: remove broken lazytime support (bsc#1173826).
- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).
- usb: c67x00: fix use after free in c67x00_giveback_urb (bsc#1111666).
- usb: chipidea: core: add wakeup support for extcon (bsc#1111666).
- usb: dwc2: Fix shutdown callback in platform (bsc#1111666).
- usb: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).
- usb: dwc3: gadget: introduce cancelled_list (git-fixes).
- usb: dwc3: gadget: never call ->complete() from ->ep_queue() (git-fixes).
- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).
- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).
- usb: ehci: reopen solution for Synopsys HC bug (git-fixes).
- usb: gadget: fix potential double-free in m66592_probe (bsc#1111666).
- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).
- usb: gadget: udc: atmel: fix uninitialized read in debug printk (bsc#1111666).
- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (bsc#1111666).
- usb: gadget: udc: Potential Oops in error handling code (bsc#1111666).
- usb: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).
- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (bsc#1111666).
- usb: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).
- usb: musb: Fix runtime PM imbalance on error (bsc#1051510).
- usb: musb: start session in resume for host port (bsc#1051510).
- usbnet: smsc95xx: Fix use-after-free after removal (bsc#1111666).
- usb: ohci-sm501: Add missed iounmap() in remove (bsc#1111666).
- usb: serial: ch341: add new Product ID for CH340 (bsc#1111666).
- usb: serial: cypress_m8: enable Simply Automated UPB PIM (bsc#1111666).
- usb: serial: iuu_phoenix: fix memory corruption (bsc#1111666).
- usb: serial: option: add GosunCn GM500 series (bsc#1111666).
- usb: serial: option: add Quectel EG95 LTE modem (bsc#1111666).
- usb: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).
- usb: serial: qcserial: add DW5816e QDL support (bsc#1051510).
- usb: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).
- usb: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).
- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174123).
- vfs: Fix EOVERFLOW testing in put_compat_statfs64 (bnc#1151927 5.3.6).
- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).
- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).
- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).
- vmxnet3: add support to get/set rx flow hash (bsc#1172484).
- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).
- vmxnet3: avoid format strint overflow warning (bsc#1172484).
- vmxnet3: prepare for version 4 changes (bsc#1172484).
- vmxnet3: Remove always false conditional statement (bsc#1172484).
- vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1172484).
- vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1172484).
- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).
- vmxnet3: update to version 4 (bsc#1172484).
- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).
- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).
- vt_compat_ioctl(): clean up, use compat_ptr() properly (git-fixes).
- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (git-fixes).
- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).
- watchdog: sp805: fix restart handler (bsc#1111666).
- wil6210: add general initialization/size checks (bsc#1111666).
- wil6210: check rx_buff_mgmt before accessing it (bsc#1111666).
- wil6210: ignore HALP ICR if already handled (bsc#1111666).
- wil6210: make sure Rx ring sizes are correlated (git-fixes).
- work around mvfs bug (bsc#1162063).
- x86/apic: Install an empty physflat_init_apic_ldr (bsc#1163309).
- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).
- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).
- x86: Fix early boot crash on gcc-10, third try (bsc#1114279).
- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).
- x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).
- xfrm: fix error in comment (git fixes).
- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).
- xhci: Fix incorrect EP_STATE_MASK (git-fixes).
- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).
Patchnames
openSUSE-2020-1153
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c where it did not check the length of variable elements in a beacon head, leading to a buffer overflow (bnc#1152107 1173659).\n- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).\n- CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).\n- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n- CVE-2020-10766: Fixed rogue cross-process SSBD shutdown. Linux scheduler logical bug allowed an attacker to turn off the SSBD protection. (bnc#1172781).\n- CVE-2020-10767: Fixed indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (bnc#1172782).\n- CVE-2020-10768: Fixed indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).\n- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n- CVE-2020-10773: Fixed a kernel stack information leak on s390/s390x. (bnc#1172999).\n- CVE-2020-10781: A zram sysfs resource consumption was fixed. (bnc#1173074).\n- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).\n- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n- CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii was called several times in a row, aka CID-b86dab054059. (bnc#1172775).\n- CVE-2020-14331: Fixed a buffer over write in vgacon_scroll (bnc#1174205).\n- CVE-2020-14331: Fixed an out of bounds write to the vgacon scrollback buffer (bsc#1174205).\n- CVE-2020-14416: A race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n- CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770 (bnc#1173514).\n- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n- CVE-2020-16166: The Linux kernel allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c (bnc#1174757).\n\nThe following non-security bugs were fixed:\n\n- ACPI: GED: add support for _Exx / _Lxx handler methods (bsc#1111666).\n- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (bsc#1111666).\n- ACPI: NFIT: Fix unlock on error in scrub_show() (bsc#1171753).\n- ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).\n- ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).\n- ACPI: video: Use native backlight on Acer Aspire 5783z (bsc#1111666).\n- ACPI: video: Use native backlight on Acer TravelMate 5735Z (bsc#1111666).\n- ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).\n- ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).\n- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (bsc#1111666).\n- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).\n- ALSA: hda/hdmi - enable runtime pm for newer AMD display audio (bsc#1111666).\n- ALSA: hda - let hs_mic be picked ahead of hp_mic (bsc#1111666).\n- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (bsc#1111666).\n- ALSA: hda/realtek - Add LED class support for micmute LED (bsc#1111666).\n- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for Lenovo Carbon X1 8th gen (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for MSI GL63 (bsc#1111666).\n- ALSA: hda/realtek - change to suitable link model for ASUS platform (bsc#1111666).\n- ALSA: hda/realtek - Check headset type by unplug and resume (bsc#1111666).\n- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (bsc#1111666).\n- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (bsc#1111666).\n- ALSA: hda/realtek - Enable micmute LED on and HP system (bsc#1111666).\n- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (bsc#1111666).\n- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (bsc#1111666).\n- ALSA: hda/realtek: Fix add a \u0027ultra_low_power\u0027 function for intel reference board (alc256) (bsc#1111666).\n- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (bsc#1111666).\n- ALSA: hda/realtek - Fixed HP right speaker no sound (bsc#1111666).\n- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (bsc#1111666).\n- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).\n- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (bsc#1111666).\n- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (bsc#1111666).\n- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).\n- ALSA: lx6464es - add support for LX6464ESe pci express variant (bsc#1111666).\n- ALSA: opl3: fix infoleak in opl3 (bsc#1111666).\n- ALSA: pcm: disallow linking stream to itself (bsc#1111666).\n- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (bsc#1111666).\n- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (bsc#1111666).\n- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (bsc#1111666).\n- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (bsc#1111666).\n- ALSA: usb-audio: Clean up quirk entries with macros (bsc#1111666).\n- ALSA: usb-audio: Fix inconsistent card PM state after resume (bsc#1111666).\n- ALSA: usb-audio: Fix packet size calculation (bsc#1111666).\n- ALSA: usb-audio: Fix racy list management in output queue (bsc#1111666).\n- ALSA: usb-audio: Improve frames size computation (bsc#1111666).\n- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (bsc#1111666).\n- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (bsc#1111666).\n- amdgpu: a NULL -\u003emm does not mean a thread is a kthread (git-fixes).\n- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12423).\n- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (bsc#1111666).\n- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (bsc#1111666).\n- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (bsc#1111666).\n- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (bsc#1111666).\n- ax25: fix setsockopt(SO_BINDTODEVICE) (networking-stable-20_05_27).\n- b43: Fix connection problem with WPA3 (bsc#1111666).\n- b43_legacy: Fix connection problem with WPA3 (bsc#1111666).\n- bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).\n- be2net: fix link failure after ethtool offline test (git-fixes).\n- block: Fix use-after-free in blkdev_get() (bsc#1174843).\n- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).\n- block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).\n- block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).\n- Bluetooth: Add SCO fallback for invalid LMP parameters error (bsc#1111666).\n- bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).\n- bnxt_en: Fix ethtool selftest crash under error conditions (git-fixes).\n- bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE cmd fails (git-fixes).\n- bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).\n- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (git-fixes).\n- bnxt_en: Fix VF anti-spoof filter setup (networking-stable-20_05_12).\n- bnxt_en: Fix VLAN acceleration handling in bnxt_fix_features() (networking-stable-20_05_12).\n- bnxt_en: Improve AER slot reset (networking-stable-20_05_12).\n- brcmfmac: fix wrong location to get firmware feature (bsc#1111666).\n- brcmfmac: Transform compatible string for FW loading (bsc#1169771).\n- btrfs: add assertions for tree == inode-\u003eio_tree to extent IO helpers (bsc#1174438).\n- btrfs: add new helper btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: Always use a cached extent_state in btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).\n- btrfs: do not zero f_bavail if we have available space (bsc#1168081).\n- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).\n- btrfs: fix extent_state leak in btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).\n- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).\n- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).\n- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).\n- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).\n- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).\n- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).\n- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).\n- btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).\n- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).\n- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).\n- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).\n- btrfs: Return EAGAIN if we can\u0027t start no snpashot write in check_can_nocow (bsc#1174438).\n- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).\n- btrfs: Use newly introduced btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).\n- bus: hisi_lpc: Add .remove method to avoid driver unbind crash (bsc#1174658).\n- bus: hisi_lpc: Do not fail probe for unrecognised child devices (bsc#1174658).\n- bus: hisi_lpc: Unregister logical PIO range to avoid potential use-after-free (bsc#1174658).\n- bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads (bsc#1111666).\n- carl9170: remove P2P_GO support (bsc#1111666).\n- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).\n- CDC-ACM: heed quirk also in error handling (git-fixes).\n- ceph: convert mdsc-\u003ecap_dirty to a per-session list (bsc#1167104).\n- ceph: request expedited service on session\u0027s last cap flush (bsc#1167104).\n- cgroup, blkcg: Prepare some symbols for module and !CONFIG_CGROUP usages (bsc#1173857).\n- char/random: Add a newline at the end of the file (jsc#SLE-12423).\n- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).\n- cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).\n- cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).\n- clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).\n- clk: clk-flexgen: fix clock-critical handling (bsc#1051510).\n- clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).\n- clocksource: dw_apb_timer: Make CPU-affiliation being optional (bsc#1111666).\n- compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).\n- compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).\n- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1174549\n- copy_{to,from}_user(): consolidate object size checks (git fixes).\n- crypto: algboss - do not wait during notifier callback (bsc#1111666).\n- crypto: algif_skcipher - Cap recv SG list at ctx-\u003eused (bsc#1111666).\n- crypto: caam - update xts sector size for large input length (bsc#1111666).\n- crypto: cavium/nitrox - Fix \u0027nitrox_get_first_device()\u0027 when ndevlist is fully iterated (bsc#1111666).\n- crypto: cavium/nitrox - Fix \u0027nitrox_get_first_device()\u0027 when ndevlist is fully iterated (git-fixes).\n- crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).\n- crypto: chelsio/chtls: properly set tp-\u003elsndtime (bsc#1111666).\n- crypto: rockchip - fix scatterlist nents error (git-fixes).\n- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).\n- crypto: talitos - check AES key size (git-fixes).\n- crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK (git-fixes).\n- crypto: talitos - fix IPsec cipher in length (git-fixes).\n- crypto: talitos - reorder code in talitos_edesc_alloc() (git-fixes).\n- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).\n- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).\n- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).\n- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).\n- dlm: remove BUG() before panic() (bsc#1174844).\n- dmaengine: tegra210-adma: Fix an error handling path in \u0027tegra_adma_probe()\u0027 (bsc#1111666).\n- dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).\n- dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).\n- dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).\n- dm: fix potential for q-\u003emake_request_fn NULL pointer (git fixes (block drivers)).\n- dm space map common: fix to ensure new block isn\u0027t already in use (git fixes (block drivers)).\n- dm: various cleanups to md-\u003equeue initialization code (git fixes).\n- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).\n- dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).\n- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).\n- driver-core, libnvdimm: Let device subsystems add local lockdep coverage (bsc#1171753)\n- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617, bsc#1170618).\n- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).\n- drm: amd/display: fix Kconfig help text (bsc#1113956) \t* only fix DEBUG_KERNEL_DC\n- drm: bridge: adv7511: Extend list of audio sample rates (bsc#1111666).\n- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1113956) * context changes\n- drm: encoder_slave: fix refcouting error for modules (bsc#1111666).\n- drm: encoder_slave: fix refcouting error for modules (bsc#1114279)\n- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1112178)\n- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (bsc#1111666).\n- drm/mediatek: Check plane visibility in atomic_update (bsc#1113956) * context changes\n- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1111666).\n- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (bsc#1111666).\n- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (bsc#1111666).\n- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1113956)\n- drm/radeon: fix double free (bsc#1113956)\n- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1113956)\n- drm/sun4i: hdmi ddc clk: Fix size of m divider (bsc#1111666).\n- drm/tegra: hub: Do not enable orphaned window group (bsc#1111666).\n- drm/vkms: Hold gem object while still in-use (bsc#1113956) * context changes\n- e1000: Distribute switch variables for initialization (bsc#1111666).\n- e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).\n- e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).\n- e1000e: Relax condition to trigger reset for ME workaround (bsc#1111666).\n- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).\n- efi/memreserve: deal with memreserve entries in unmapped memory (bsc#1174685).\n- efi/random: Increase size of firmware supplied randomness (jsc#SLE-12423).\n- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12423).\n- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12423).\n- efi: Reorder pr_notice() with add_device_randomness() call (jsc#SLE-12423).\n- evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).\n- evm: Fix a small race in init_desc() (bsc#1051510).\n- ext4: fix a data race at inode-\u003ei_blocks (bsc#1171835).\n- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1174840).\n- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).\n- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).\n- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).\n- extcon: adc-jack: Fix an error handling path in \u0027adc_jack_probe()\u0027 (bsc#1051510).\n- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).\n- fat: do not allow to mount if the FAT length == 0 (bsc#1174845).\n- fdt: add support for rng-seed (jsc#SLE-12423).\n- fdt: Update CRC check for rng-seed (jsc#SLE-12423).\n- firmware: imx: scu: Fix corruption of header (git-fixes).\n- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (bsc#1111666).\n- fix multiplication overflow in copy_fdtable() (bsc#1173825).\n- Fix Patch-mainline tag in the previous zram fix patch\n- fpga: dfl: fix bug in port reset handshake (git-fixes).\n- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).\n- gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).\n- gpu: host1x: Detach driver on unregister (bsc#1111666).\n- gpu: ipu-v3: pre: do not trigger update if buffer address does not change (bsc#1111666).\n- HID: hiddev: fix mess in hiddev_open() (git-fixes).\n- HID: magicmouse: do not set up autorepeat (git-fixes).\n- HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).\n- HISI LPC: Re-Add ACPI child enumeration support (bsc#1174658).\n- HISI LPC: Stop using MFD APIs (bsc#1174658).\n- hv_netvsc: Fix netvsc_start_xmit\u0027s return type (git-fixes).\n- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (bsc#1111666).\n- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (bsc#1111666).\n- hwmon: (max6697) Make sure the OVERT mask is set correctly (bsc#1111666).\n- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (bsc#1111666).\n- i2c: eg20t: Load module automatically if ID matches (bsc#1111666).\n- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (bsc#1111666).\n- i40e: reduce stack usage in i40e_set_fc (git-fixes).\n- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).\n- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).\n- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).\n- ibmvnic: Flush existing work items before device removal (bsc#1065729).\n- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).\n- iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).\n- iio:health:afe4404 Fix timestamp alignment and prevent data leak (bsc#1111666).\n- iio:humidity:hdc100x Fix alignment and data leak issues (bsc#1111666).\n- iio:magnetometer:ak8974: Fix alignment and data leak issues (bsc#1111666).\n- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (bsc#1111666).\n- iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).\n- iio:pressure:ms5611 Fix buffer element alignment (bsc#1111666).\n- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (bsc#1111666).\n- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).\n- ima: Fix ima digest hash table key calculation (bsc#1051510).\n- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).\n- input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (bsc#1111666).\n- input: i8042 - Remove special PowerPC handling (git-fixes).\n- input: synaptics - add a second working PNP_ID for Lenovo T470s (bsc#1111666).\n- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).\n- intel_th: Fix a NULL dereference when hub driver is not loaded (bsc#1111666).\n- io-mapping: indicate mapping failure (git-fixes).\n- ipvlan: call dev_change_flags when ipvlan mode is reset (git-fixes).\n- ixgbevf: Remove limit of 10 entries for unicast filter list (git-fixes).\n- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).\n- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).\n- kabi: hv: prevent struct device_node to become defined (bsc#1172871).\n- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12423).\n- kABI: protect struct mlx5_cmd_work_ent (kabi).\n- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).\n- kernfs: fix barrier usage in __kernfs_new_node() (bsc#1111666).\n- kvm: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).\n- kvm: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).\n- kvm: x86: Fix APIC page invalidation race (bsc#1174122).\n- kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).\n- kvm: x86/mmu: Set mmio_value to \u00270\u0027 if reserved #PF can\u0027t be generated (bsc#1171904).\n- kvm: x86: only do L1TF workaround on affected processors (bsc#1171904).\n- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).\n- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).\n- libceph: do not omit recovery_deletes in target_copy() (bsc#1174113).\n- libceph: ignore pool overlay and cache logic on redirects (bsc#1173146).\n- lib: logic_pio: Add logic_pio_unregister_range() (bsc#1174658).\n- lib: logic_pio: Avoid possible overlap for unregistering regions (bsc#1174658).\n- lib: logic_pio: Fix RCU usage (bsc#1174658).\n- libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA deadlock (bsc#1171753).\n- libnvdimm/bus: Prepare the nd_ioctl() path to be re-entrant (bsc#1171753).\n- libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over __nd_ioctl() (bsc#1171753).\n- libnvdimm: cover up changes in struct nvdimm_bus (bsc#1171753).\n- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).\n- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).\n- libnvdimm/label: Remove the dpa align check (bsc#1171759).\n- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).\n- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).\n- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).\n- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).\n- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).\n- libnvdimm/region: Initialize bad block for volatile namespaces (bnc#1151927 5.3.6).\n- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).\n- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).\n- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).\n- livepatch: Disallow vmlinux.ko (bsc#1071995).\n- livepatch: Make klp_apply_object_relocs static (bsc#1071995).\n- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).\n- livepatch: Remove .klp.arch (bsc#1071995).\n- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).\n- lpfc_debugfs: get rid of pointless access_ok() (bsc#1172687 bsc#1171530).\n- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).\n- mac80211: add option for setting control flags (bsc#1111666).\n- mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for nl80211 TX (bsc#1111666).\n- mailbox: imx: Disable the clock on devm_mbox_controller_register() failure (git-fixes).\n- md: Avoid namespace collision with bitmap API (git fixes (block drivers)).\n- mdraid: fix read/write bytes accounting (bsc#1172537).\n- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (bsc#1166985)).\n- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).\n- media: si2157: Better check for running tuner in init (bsc#1111666).\n- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered workqueue (git-fixes).\n- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw workqueue (git-fixes).\n- mlxsw: pci: Return error on PCI reset timeout (git-fixes).\n- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).\n- mlxsw: spectrum: Disallow prio-tagged packets when PVID is removed (git-fixes).\n- mlxsw: spectrum_dpipe: Add missing error path (git-fixes).\n- mlxsw: spectrum: Prevent force of 56G (git-fixes).\n- mlxsw: spectrum_router: Refresh nexthop neighbour when it becomes dead (git-fixes).\n- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (git-fixes).\n- mlxsw: spectrum_switchdev: Add MDB entries in prepare phase (git-fixes).\n- mlxsw: spectrum_switchdev: Do not treat static FDB entries as sticky (git-fixes).\n- mmc: block: Fix request completion in the CQE timeout path (bsc#1111666).\n- mmc: block: Fix use-after-free issue for rpmb (bsc#1111666).\n- mmc: fix compilation of user API (bsc#1051510).\n- mmc: sdhci: do not enable card detect interrupt for gpio cd type (bsc#1111666).\n- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (bsc#1111666).\n- Move kabi patch into the right place\n- Move upstreamed lpfc patches into sorted section\n- mvpp2: remove misleading comment (git-fixes).\n- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).\n- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).\n- net/cxgb4: Check the return from t4_query_params properly (git-fixes).\n- net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).\n- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).\n- net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it (git-fixes).\n- net: ena: add missing ethtool TX timestamping indication (git-fixes).\n- net: ena: avoid memory access violation by validating req_id properly (git-fixes).\n- net: ena: do not wake up tx queue when down (git-fixes).\n- net: ena: ena-com.c: prevent NULL pointer dereference (git-fixes).\n- net: ena: ethtool: use correct value for crc32 hash (git-fixes).\n- net: ena: fix continuous keep-alive resets (git-fixes).\n- net: ena: fix corruption of dev_idx_to_host_tbl (git-fixes).\n- net: ena: fix default tx interrupt moderation interval (git-fixes).\n- net: ena: fix incorrect default RSS key (git-fixes).\n- net: ena: fix incorrectly saving queue numbers when setting RSS indirection table (git-fixes).\n- net: ena: fix issues in setting interrupt moderation params in ethtool (git-fixes).\n- net: ena: fix potential crash when rxfh key is NULL (git-fixes).\n- net: ena: fix retrieval of nonadaptive interrupt moderation intervals (git-fixes).\n- net: ena: fix uses of round_jiffies() (git-fixes).\n- net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE (git-fixes).\n- net: ena: reimplement set/get_coalesce() (git-fixes).\n- net: ena: rss: do not allocate key when not supported (git-fixes).\n- net: ena: rss: fix failure to get indirection table (git-fixes).\n- net: ena: rss: store hash function as values and not bits (git-fixes).\n- netfilter: connlabels: prefer static lock initialiser (git-fixes).\n- netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).\n- netfilter: not mark a spinlock as __read_mostly (git-fixes).\n- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).\n- net: hns3: add autoneg and change speed support for fibre port (bsc#1174070).\n- net: hns3: add support for FEC encoding control (bsc#1174070).\n- net: hns3: add support for multiple media type (bsc#1174070).\n- net: hns3: fix a not link up issue when fibre port supports autoneg (bsc#1174070).\n- net: hns3: fix for FEC configuration (bsc#1174070).\n- net: hns3: fix port capbility updating issue (bsc#1174070).\n- net: hns3: fix port setting handle for fibre port (bsc#1174070).\n- net: hns3: fix selftest fail issue for fibre port with autoneg on (bsc#1174070).\n- net: hns3: restore the MAC autoneg state after reset (bsc#1174070).\n- net: inet_csk: Fix so_reuseport bind-address cache in tb-\u003efast* (networking-stable-20_05_27).\n- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).\n- net: ipvlan: Fix ipvlan device tso disabled while NETIF_F_IP_CSUM is set (git-fixes).\n- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).\n- net/mlx4_core: drop useless LIST_HEAD (git-fixes).\n- net/mlx4_core: fix a memory leak bug (git-fixes).\n- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).\n- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).\n- net/mlx5: Avoid panic when setting vport rate (git-fixes).\n- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).\n- net/mlx5e: ethtool, Fix a typo in WOL function names (git-fixes).\n- net/mlx5e: Fix traffic duplication in ethtool steering (git-fixes).\n- net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).\n- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).\n- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).\n- net/mlx5: Fix crash upon suspend/resume (networking-stable-20_06_07).\n- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).\n- net: mvmdio: allow up to four clocks to be specified for orion-mdio (git-fixes).\n- net: mvpp2: prs: Do not override the sign bit in SRAM parser shift (git-fixes).\n- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).\n- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).\n- net: qede: stop adding events on an already destroyed workqueue (git-fixes).\n- net: qed: fix excessive QM ILT lines consumption (git-fixes).\n- net: qed: fix NVMe login fails over VFs (git-fixes).\n- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).\n- net: revert \u0027net: get rid of an signed integer overflow in ip_idents_reserve()\u0027 (networking-stable-20_05_27).\n- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).\n- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).\n- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).\n- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).\n- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).\n- net: usb: qmi_wwan: add Telit 0x1050 composition (networking-stable-20_06_07).\n- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).\n- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).\n- nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K (git-fixes).\n- NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).\n- NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).\n- nilfs2: fix null pointer dereference at nilfs_segctor_do_construct() (bsc#1173857).\n- nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type (bsc#1111666).\n- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).\n- nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).\n- nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).\n- nvme: fail cancelled commands with NVME_SC_HOST_PATH_ERROR (bsc#1158983 bsc#1172538).\n- nvme-fc: Fail transport errors with NVME_SC_HOST_PATH (bsc#1158983 bsc#1172538).\n- nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send failed (bsc#1158983 bsc#1172538).\n- objtool: Clean instruction state before each function validation (bsc#1169514).\n- objtool: Ignore empty alternatives (bsc#1169514).\n- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n- ocfs2: load global_inode_alloc (bsc#1172963).\n- ocfs2: no need try to truncate file beyond i_size (bsc#1171841).\n- overflow: Fix -Wtype-limits compilation warnings (git fixes).\n- overflow.h: Add arithmetic shift helper (git fixes).\n- p54usb: add AirVasT USB stick device-id (bsc#1051510).\n- padata: ensure the reorder timer callback runs on the correct CPU (git-fixes).\n- padata: reorder work kABI fixup (git-fixes).\n- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).\n- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).\n- PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).\n- PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).\n- PCI: Fix \u0027try\u0027 semantics of bus and slot reset (git-fixes).\n- PCI: Generalize multi-function power dependency device links (bsc#1111666).\n- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871, bsc#1172872).\n- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871, bsc#1172872).\n- PCI: hv: Introduce hv_msi_entry (bsc#1172871, bsc#1172872).\n- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871, bsc#1172872).\n- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871, bsc#1172872).\n- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871, bsc#1172872).\n- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871, bsc#1172872).\n- PCI: pciehp: Fix indefinite wait on sysfs requests (git-fixes).\n- PCI: pciehp: Support interrupts sent from D3hot (git-fixes).\n- PCI: Program MPS for RCiEP devices (bsc#1051510).\n- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).\n- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).\n- pcm_native: result of put_user() needs to be checked (bsc#1111666).\n- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).\n- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).\n- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).\n- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).\n- perf/x86/amd/iommu: Make the \u0027amd_iommu_attr_groups\u0027 symbol static (git-fixes).\n- perf/x86/amd/uncore: Do not set \u0027ThreadMask\u0027 and \u0027SliceMask\u0027 for non-L3 PMCs (git-fixes stable).\n- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).\n- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).\n- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).\n- perf/x86: Fix incorrect PEBS_REGS (git-fixes).\n- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).\n- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).\n- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).\n- perf/x86/intel: Fix PT PMI handling (git-fixes).\n- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).\n- perf/x86/intel/uncore: Add Node ID mask (git-fixes).\n- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).\n- perf/x86/intel/uncore: Handle invalid event coding for free-running counter (git-fixes).\n- perf/x86/uncore: Fix event group support (git-fixes).\n- pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).\n- pinctrl: freescale: imx: Fix an error handling path in \u0027imx_pinctrl_probe()\u0027 (bsc#1051510).\n- pinctrl: imxl: Fix an error handling path in \u0027imx1_pinctrl_core_probe()\u0027 (bsc#1051510).\n- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).\n- platform/x86: dell-laptop: do not register micmute LED if there is no token (bsc#1111666).\n- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (bsc#1111666).\n- PM / Domains: Allow genpd users to specify default active wakeup behavior (git-fixes).\n- pnp: Use list_for_each_entry() instead of open coding (git fixes).\n- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).\n- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).\n- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).\n- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).\n- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).\n- powerpc-mm-Remove-kvm-radix-prefetch-workaround-for-.patch\n- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).\n- powerpc-xmon-don-t-access-ASDR-in-VMs.patch\n- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).\n- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).\n- power: supply: lp8788: Fix an error handling path in \u0027lp8788_charger_probe()\u0027 (bsc#1051510).\n- power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).\n- power: vexpress: add suppress_bind_attrs to true (bsc#1111666).\n- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).\n- propagate_one(): mnt_set_mountpoint() needs mount_lock (bsc#1174841).\n- qed: reduce maximum stack frame size (git-fixes).\n- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).\n- r8152: support additional Microsoft Surface Ethernet Adapter variant (networking-stable-20_05_27).\n- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).\n- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1111666)\n- RDMA/efa: Set maximum pkeys device attribute (bsc#1111666)\n- RDMA/efa: Support remote read access in MR registration (bsc#1111666)\n- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1111666)\n- README.BRANCH: Add Takashi Iwai as primary maintainer.\n- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (bsc#1111666).\n- Revert \u0027bcache: ignore pending signals when creating gc and allocator thread\u0027 (git fixes (block drivers)).\n- Revert commit e918e570415c (\u0027tpm_tis: Remove the HID IFX0102\u0027) (bsc#1111666).\n- Revert \u0027dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues\u0027 (git fixes (block drivers)).\n- Revert \u0027ipv6: add mtu lock check in __ip6_rt_update_pmtu\u0027 (networking-stable-20_05_16).\n- Revert pciehp patches that broke booting (bsc#1174887)\n- Revert \u0027thermal: mediatek: fix register index error\u0027 (bsc#1111666).\n- Revert \u0027tools lib traceevent: Remove unneeded qsort and uses memmove\u0027\n- rtnetlink: Fix memory(net_device) leak when -\u003enewlink fails (git-fixes).\n- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).\n- s390: fix syscall_get_error for compat processes (git-fixes).\n- s390/qdio: consistently restore the IRQ handler (git-fixes).\n- s390/qdio: lock device while installing IRQ handler (git-fixes).\n- s390/qdio: put thinint indicator after early error (git-fixes).\n- s390/qdio: tear down thinint indicator after early error (git-fixes).\n- s390/qeth: fix error handling for isolation mode cmds (git-fixes).\n- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).\n- sch_sfq: validate silly quantum values (networking-stable-20_05_12).\n- scripts/git_sort/git_sort.py: add bluetooth/bluetooth-next.git repository\n- scsi: aacraid: fix a signedness bug (bsc#1174296).\n- scsi: hisi_sas: fix calls to dma_set_mask_and_coherent() (bsc#1174296).\n- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).\n- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix inconsistent indenting (bsc#1158983).\n- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1158983).\n- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1158983).\n- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1158983).\n- scsi: megaraid_sas: Fix a compilation warning (bsc#1174296).\n- scsi: mpt3sas: Fix double free in attach error handling (bsc#1174296).\n- scsi: qedf: Add port_id getter (bsc#1150660).\n- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1174296).\n- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).\n- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).\n- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).\n- spi: dw: use \u0027smp_mb()\u0027 to avoid sending spi data error (bsc#1051510).\n- spi: fix initial SPI_SR value in spi-fsl-dspi (bsc#1111666).\n- spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).\n- spi: spidev: fix a race between spidev_release and spidev_remove (bsc#1111666).\n- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (bsc#1111666).\n- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (bsc#1111666).\n- staging: comedi: verify array index is correct before using it (bsc#1111666).\n- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).\n- staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).\n- SUNRPC: The TCP back channel mustn\u0027t disappear while requests are outstanding (bsc#1152624).\n- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).\n- timers: Add a function to start/reduce a timer (networking-stable-20_05_27).\n- tpm_tis: extra chip-\u003eops check on error path in tpm_tis_core_init (bsc#1111666).\n- tpm_tis: Remove the HID IFX0102 (bsc#1111666).\n- tracing: Fix event trigger to accept redundant spaces (git-fixes).\n- tty: hvc_console, fix crashes on parallel open/close (git-fixes).\n- tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).\n- tty: n_gsm: Fix SOF skipping (bsc#1051510).\n- tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).\n- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).\n- ubifs: remove broken lazytime support (bsc#1173826).\n- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).\n- usb: c67x00: fix use after free in c67x00_giveback_urb (bsc#1111666).\n- usb: chipidea: core: add wakeup support for extcon (bsc#1111666).\n- usb: dwc2: Fix shutdown callback in platform (bsc#1111666).\n- usb: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).\n- usb: dwc3: gadget: introduce cancelled_list (git-fixes).\n- usb: dwc3: gadget: never call -\u003ecomplete() from -\u003eep_queue() (git-fixes).\n- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).\n- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).\n- usb: ehci: reopen solution for Synopsys HC bug (git-fixes).\n- usb: gadget: fix potential double-free in m66592_probe (bsc#1111666).\n- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).\n- usb: gadget: udc: atmel: fix uninitialized read in debug printk (bsc#1111666).\n- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (bsc#1111666).\n- usb: gadget: udc: Potential Oops in error handling code (bsc#1111666).\n- usb: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).\n- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (bsc#1111666).\n- usb: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).\n- usb: musb: Fix runtime PM imbalance on error (bsc#1051510).\n- usb: musb: start session in resume for host port (bsc#1051510).\n- usbnet: smsc95xx: Fix use-after-free after removal (bsc#1111666).\n- usb: ohci-sm501: Add missed iounmap() in remove (bsc#1111666).\n- usb: serial: ch341: add new Product ID for CH340 (bsc#1111666).\n- usb: serial: cypress_m8: enable Simply Automated UPB PIM (bsc#1111666).\n- usb: serial: iuu_phoenix: fix memory corruption (bsc#1111666).\n- usb: serial: option: add GosunCn GM500 series (bsc#1111666).\n- usb: serial: option: add Quectel EG95 LTE modem (bsc#1111666).\n- usb: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).\n- usb: serial: qcserial: add DW5816e QDL support (bsc#1051510).\n- usb: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).\n- usb: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).\n- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174123).\n- vfs: Fix EOVERFLOW testing in put_compat_statfs64 (bnc#1151927 5.3.6).\n- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).\n- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).\n- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).\n- vmxnet3: add support to get/set rx flow hash (bsc#1172484).\n- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).\n- vmxnet3: avoid format strint overflow warning (bsc#1172484).\n- vmxnet3: prepare for version 4 changes (bsc#1172484).\n- vmxnet3: Remove always false conditional statement (bsc#1172484).\n- vmxnet3: remove redundant initialization of pointer \u0027rq\u0027 (bsc#1172484).\n- vmxnet3: remove unused flag \u0027rxcsum\u0027 from struct vmxnet3_adapter (bsc#1172484).\n- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).\n- vmxnet3: update to version 4 (bsc#1172484).\n- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).\n- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).\n- vt_compat_ioctl(): clean up, use compat_ptr() properly (git-fixes).\n- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (git-fixes).\n- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).\n- watchdog: sp805: fix restart handler (bsc#1111666).\n- wil6210: add general initialization/size checks (bsc#1111666).\n- wil6210: check rx_buff_mgmt before accessing it (bsc#1111666).\n- wil6210: ignore HALP ICR if already handled (bsc#1111666).\n- wil6210: make sure Rx ring sizes are correlated (git-fixes).\n- work around mvfs bug (bsc#1162063).\n- x86/apic: Install an empty physflat_init_apic_ldr (bsc#1163309).\n- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).\n- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).\n- x86: Fix early boot crash on gcc-10, third try (bsc#1114279).\n- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).\n- x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).\n- xfrm: fix error in comment (git fixes).\n- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).\n- xhci: Fix incorrect EP_STATE_MASK (git-fixes).\n- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-1153", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1153-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:1153-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TP74A7GFRKHFHFASPUDW72EHCZZEIBB/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:1153-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TP74A7GFRKHFHFASPUDW72EHCZZEIBB/" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1120163", "url": "https://bugzilla.suse.com/1120163" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1148868", "url": "https://bugzilla.suse.com/1148868" }, { "category": "self", "summary": "SUSE Bug 1150660", "url": "https://bugzilla.suse.com/1150660" }, { "category": "self", "summary": "SUSE Bug 1151927", "url": "https://bugzilla.suse.com/1151927" }, { "category": "self", "summary": "SUSE Bug 1152107", "url": "https://bugzilla.suse.com/1152107" }, { "category": "self", "summary": "SUSE Bug 1152624", "url": "https://bugzilla.suse.com/1152624" }, { "category": "self", "summary": "SUSE Bug 1158983", "url": "https://bugzilla.suse.com/1158983" }, { "category": "self", "summary": "SUSE Bug 1159058", "url": "https://bugzilla.suse.com/1159058" }, { "category": "self", "summary": "SUSE Bug 1161016", "url": "https://bugzilla.suse.com/1161016" }, { "category": "self", "summary": "SUSE Bug 1162002", "url": "https://bugzilla.suse.com/1162002" }, { "category": "self", "summary": "SUSE Bug 1162063", "url": "https://bugzilla.suse.com/1162063" }, { "category": "self", "summary": "SUSE Bug 1163309", "url": "https://bugzilla.suse.com/1163309" }, { "category": "self", "summary": "SUSE Bug 1166985", "url": "https://bugzilla.suse.com/1166985" }, { "category": "self", "summary": "SUSE Bug 1167104", "url": "https://bugzilla.suse.com/1167104" }, { "category": "self", "summary": "SUSE Bug 1168081", "url": "https://bugzilla.suse.com/1168081" }, { "category": "self", "summary": "SUSE Bug 1168959", "url": "https://bugzilla.suse.com/1168959" }, { "category": "self", "summary": "SUSE Bug 1169194", "url": "https://bugzilla.suse.com/1169194" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169771", "url": "https://bugzilla.suse.com/1169771" }, { "category": "self", "summary": "SUSE Bug 1169795", "url": "https://bugzilla.suse.com/1169795" }, { "category": "self", "summary": "SUSE Bug 1170011", "url": "https://bugzilla.suse.com/1170011" }, { "category": "self", "summary": "SUSE Bug 1170442", "url": "https://bugzilla.suse.com/1170442" }, { "category": "self", "summary": "SUSE Bug 1170592", "url": "https://bugzilla.suse.com/1170592" }, { "category": "self", "summary": "SUSE Bug 1170617", "url": "https://bugzilla.suse.com/1170617" }, { "category": "self", "summary": "SUSE Bug 1170618", "url": "https://bugzilla.suse.com/1170618" }, { "category": "self", "summary": "SUSE Bug 1171124", "url": "https://bugzilla.suse.com/1171124" }, { "category": "self", "summary": "SUSE Bug 1171424", "url": "https://bugzilla.suse.com/1171424" }, { "category": "self", "summary": "SUSE Bug 1171529", "url": "https://bugzilla.suse.com/1171529" }, { "category": "self", "summary": "SUSE Bug 1171530", "url": "https://bugzilla.suse.com/1171530" }, { "category": "self", "summary": "SUSE Bug 1171558", "url": "https://bugzilla.suse.com/1171558" }, { "category": "self", "summary": "SUSE Bug 1171732", "url": "https://bugzilla.suse.com/1171732" }, { "category": "self", "summary": "SUSE Bug 1171739", "url": "https://bugzilla.suse.com/1171739" }, { "category": "self", "summary": "SUSE Bug 1171743", "url": "https://bugzilla.suse.com/1171743" }, { "category": "self", "summary": "SUSE Bug 1171753", "url": "https://bugzilla.suse.com/1171753" }, { "category": "self", "summary": "SUSE Bug 1171759", "url": "https://bugzilla.suse.com/1171759" }, { "category": "self", "summary": "SUSE Bug 1171835", "url": "https://bugzilla.suse.com/1171835" }, { "category": "self", "summary": "SUSE Bug 1171841", "url": "https://bugzilla.suse.com/1171841" }, { "category": "self", "summary": "SUSE Bug 1171868", "url": "https://bugzilla.suse.com/1171868" }, { "category": "self", "summary": "SUSE Bug 1171904", "url": "https://bugzilla.suse.com/1171904" }, { "category": "self", "summary": "SUSE Bug 1171988", "url": "https://bugzilla.suse.com/1171988" }, { "category": "self", "summary": "SUSE Bug 1172247", "url": "https://bugzilla.suse.com/1172247" }, { "category": "self", "summary": "SUSE Bug 1172257", "url": "https://bugzilla.suse.com/1172257" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172458", "url": "https://bugzilla.suse.com/1172458" }, { "category": "self", "summary": "SUSE Bug 1172484", "url": "https://bugzilla.suse.com/1172484" }, { "category": "self", "summary": "SUSE Bug 1172537", "url": "https://bugzilla.suse.com/1172537" }, { "category": "self", "summary": "SUSE Bug 1172538", "url": "https://bugzilla.suse.com/1172538" }, { "category": "self", "summary": "SUSE Bug 1172687", "url": "https://bugzilla.suse.com/1172687" }, { "category": "self", "summary": "SUSE Bug 1172719", "url": "https://bugzilla.suse.com/1172719" }, { "category": "self", "summary": "SUSE Bug 1172759", "url": "https://bugzilla.suse.com/1172759" }, { "category": "self", "summary": "SUSE Bug 1172775", "url": "https://bugzilla.suse.com/1172775" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172871", "url": "https://bugzilla.suse.com/1172871" }, { "category": "self", "summary": "SUSE Bug 1172872", "url": "https://bugzilla.suse.com/1172872" }, { "category": "self", "summary": "SUSE Bug 1172963", "url": "https://bugzilla.suse.com/1172963" }, { "category": "self", "summary": "SUSE Bug 1172999", "url": "https://bugzilla.suse.com/1172999" }, { "category": "self", "summary": "SUSE Bug 1173060", "url": "https://bugzilla.suse.com/1173060" }, { "category": "self", "summary": "SUSE Bug 1173074", "url": "https://bugzilla.suse.com/1173074" }, { "category": "self", "summary": "SUSE Bug 1173146", "url": "https://bugzilla.suse.com/1173146" }, { "category": "self", "summary": "SUSE Bug 1173265", "url": "https://bugzilla.suse.com/1173265" }, { "category": "self", "summary": "SUSE Bug 1173280", "url": "https://bugzilla.suse.com/1173280" }, { "category": "self", "summary": "SUSE Bug 1173284", "url": "https://bugzilla.suse.com/1173284" }, { "category": "self", "summary": "SUSE Bug 1173428", "url": "https://bugzilla.suse.com/1173428" }, { "category": "self", "summary": "SUSE Bug 1173514", "url": "https://bugzilla.suse.com/1173514" }, { "category": "self", "summary": "SUSE Bug 1173567", "url": "https://bugzilla.suse.com/1173567" }, { "category": "self", "summary": "SUSE Bug 1173573", "url": "https://bugzilla.suse.com/1173573" }, { "category": "self", "summary": "SUSE Bug 1173659", "url": "https://bugzilla.suse.com/1173659" }, { "category": "self", "summary": "SUSE Bug 1173746", "url": "https://bugzilla.suse.com/1173746" }, { "category": "self", "summary": "SUSE Bug 1173818", "url": "https://bugzilla.suse.com/1173818" }, { "category": "self", "summary": "SUSE Bug 1173820", "url": "https://bugzilla.suse.com/1173820" }, { "category": "self", "summary": "SUSE Bug 1173825", "url": "https://bugzilla.suse.com/1173825" }, { "category": "self", "summary": "SUSE Bug 1173826", "url": "https://bugzilla.suse.com/1173826" }, { "category": "self", "summary": "SUSE Bug 1173833", "url": "https://bugzilla.suse.com/1173833" }, { "category": "self", "summary": "SUSE Bug 1173838", "url": "https://bugzilla.suse.com/1173838" }, { "category": "self", "summary": "SUSE Bug 1173839", "url": "https://bugzilla.suse.com/1173839" }, { "category": "self", "summary": "SUSE Bug 1173845", "url": "https://bugzilla.suse.com/1173845" }, { "category": "self", "summary": "SUSE Bug 1173857", "url": "https://bugzilla.suse.com/1173857" }, { "category": "self", "summary": "SUSE Bug 1174070", "url": "https://bugzilla.suse.com/1174070" }, { "category": "self", "summary": "SUSE Bug 1174113", "url": "https://bugzilla.suse.com/1174113" }, { "category": "self", "summary": "SUSE Bug 1174115", "url": "https://bugzilla.suse.com/1174115" }, { "category": "self", "summary": "SUSE Bug 1174122", "url": "https://bugzilla.suse.com/1174122" }, { "category": "self", "summary": "SUSE Bug 1174123", "url": "https://bugzilla.suse.com/1174123" }, { "category": "self", "summary": "SUSE Bug 1174205", "url": "https://bugzilla.suse.com/1174205" }, { "category": "self", "summary": "SUSE Bug 1174296", "url": "https://bugzilla.suse.com/1174296" }, { "category": "self", "summary": "SUSE Bug 1174343", "url": "https://bugzilla.suse.com/1174343" }, { "category": "self", "summary": "SUSE Bug 1174356", "url": "https://bugzilla.suse.com/1174356" }, { "category": "self", "summary": "SUSE Bug 1174409", "url": "https://bugzilla.suse.com/1174409" }, { "category": "self", "summary": "SUSE Bug 1174438", "url": "https://bugzilla.suse.com/1174438" }, { "category": "self", "summary": "SUSE Bug 1174462", "url": "https://bugzilla.suse.com/1174462" }, { "category": "self", "summary": "SUSE Bug 1174543", "url": "https://bugzilla.suse.com/1174543" }, { "category": "self", "summary": "SUSE Bug 1174549", "url": "https://bugzilla.suse.com/1174549" }, { "category": "self", "summary": "SUSE Bug 1174658", "url": "https://bugzilla.suse.com/1174658" }, { "category": "self", "summary": "SUSE Bug 1174685", "url": "https://bugzilla.suse.com/1174685" }, { "category": "self", "summary": "SUSE Bug 1174757", "url": "https://bugzilla.suse.com/1174757" }, { "category": "self", "summary": "SUSE Bug 1174840", "url": "https://bugzilla.suse.com/1174840" }, { "category": "self", "summary": "SUSE Bug 1174841", "url": "https://bugzilla.suse.com/1174841" }, { "category": "self", "summary": "SUSE Bug 1174843", "url": "https://bugzilla.suse.com/1174843" }, { "category": "self", "summary": "SUSE Bug 1174844", "url": "https://bugzilla.suse.com/1174844" }, { "category": "self", "summary": "SUSE Bug 1174845", "url": "https://bugzilla.suse.com/1174845" }, { "category": "self", "summary": "SUSE Bug 1174887", "url": "https://bugzilla.suse.com/1174887" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20810 page", "url": "https://www.suse.com/security/cve/CVE-2019-20810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20908 page", "url": "https://www.suse.com/security/cve/CVE-2019-20908/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0305 page", "url": "https://www.suse.com/security/cve/CVE-2020-0305/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10769 page", "url": "https://www.suse.com/security/cve/CVE-2020-10769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10773 page", "url": "https://www.suse.com/security/cve/CVE-2020-10773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10781 page", "url": "https://www.suse.com/security/cve/CVE-2020-10781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12771 page", "url": "https://www.suse.com/security/cve/CVE-2020-12771/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12888 page", "url": "https://www.suse.com/security/cve/CVE-2020-12888/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13974 page", "url": "https://www.suse.com/security/cve/CVE-2020-13974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14416 page", "url": "https://www.suse.com/security/cve/CVE-2020-14416/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15393 page", "url": "https://www.suse.com/security/cve/CVE-2020-15393/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16166 page", "url": "https://www.suse.com/security/cve/CVE-2020-16166/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-08-06T10:21:32Z", "generator": { "date": "2020-08-06T10:21:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:1153-1", "initial_release_date": "2020-08-06T10:21:32Z", "revision_history": [ { "date": "2020-08-06T10:21:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-lp151.28.59.1.noarch", "product": { "name": "kernel-devel-4.12.14-lp151.28.59.1.noarch", "product_id": "kernel-devel-4.12.14-lp151.28.59.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-lp151.28.59.1.noarch", "product": { "name": "kernel-docs-4.12.14-lp151.28.59.1.noarch", "product_id": "kernel-docs-4.12.14-lp151.28.59.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "product_id": "kernel-docs-html-4.12.14-lp151.28.59.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-lp151.28.59.1.noarch", "product": { "name": "kernel-macros-4.12.14-lp151.28.59.1.noarch", "product_id": "kernel-macros-4.12.14-lp151.28.59.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-lp151.28.59.1.noarch", "product": { "name": "kernel-source-4.12.14-lp151.28.59.1.noarch", "product_id": "kernel-source-4.12.14-lp151.28.59.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-debug-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-debug-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-debug-base-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-default-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-default-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-default-base-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-default-devel-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-obs-build-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-syms-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-syms-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-vanilla-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-debug-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-default-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-lp151.28.59.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch" }, "product_reference": "kernel-devel-4.12.14-lp151.28.59.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-lp151.28.59.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch" }, "product_reference": "kernel-docs-4.12.14-lp151.28.59.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.12.14-lp151.28.59.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch" }, "product_reference": "kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-lp151.28.59.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch" }, "product_reference": "kernel-macros-4.12.14-lp151.28.59.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-lp151.28.59.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch" }, "product_reference": "kernel-source-4.12.14-lp151.28.59.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch" }, "product_reference": "kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2019-20810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20810" } ], "notes": [ { "category": "general", "text": "go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20810", "url": "https://www.suse.com/security/cve/CVE-2019-20810" }, { "category": "external", "summary": "SUSE Bug 1172458 for CVE-2019-20810", "url": "https://bugzilla.suse.com/1172458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "low" } ], "title": "CVE-2019-20810" }, { "cve": "CVE-2019-20908", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20908" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/firmware/efi/efi.c in the Linux kernel before 5.4. Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20908", "url": "https://www.suse.com/security/cve/CVE-2019-20908" }, { "category": "external", "summary": "SUSE Bug 1173567 for CVE-2019-20908", "url": "https://bugzilla.suse.com/1173567" }, { "category": "external", "summary": "SUSE Bug 1174187 for CVE-2019-20908", "url": "https://bugzilla.suse.com/1174187" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "important" } ], "title": "CVE-2019-20908" }, { "cve": "CVE-2020-0305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0305" } ], "notes": [ { "category": "general", "text": "In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0305", "url": "https://www.suse.com/security/cve/CVE-2020-0305" }, { "category": "external", "summary": "SUSE Bug 1174462 for CVE-2020-0305", "url": "https://bugzilla.suse.com/1174462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2020-0305" }, { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-10769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10769" } ], "notes": [ { "category": "general", "text": "A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10769", "url": "https://www.suse.com/security/cve/CVE-2020-10769" }, { "category": "external", "summary": "SUSE Bug 1173265 for CVE-2020-10769", "url": "https://bugzilla.suse.com/1173265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2020-10769" }, { "cve": "CVE-2020-10773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10773" } ], "notes": [ { "category": "general", "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u0027s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10773", "url": "https://www.suse.com/security/cve/CVE-2020-10773" }, { "category": "external", "summary": "SUSE Bug 1172999 for CVE-2020-10773", "url": "https://bugzilla.suse.com/1172999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "low" } ], "title": "CVE-2020-10773" }, { "cve": "CVE-2020-10781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10781" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10781", "url": "https://www.suse.com/security/cve/CVE-2020-10781" }, { "category": "external", "summary": "SUSE Bug 1173074 for CVE-2020-10781", "url": "https://bugzilla.suse.com/1173074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2020-10781" }, { "cve": "CVE-2020-12771", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12771" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12771", "url": "https://www.suse.com/security/cve/CVE-2020-12771" }, { "category": "external", "summary": "SUSE Bug 1171732 for CVE-2020-12771", "url": "https://bugzilla.suse.com/1171732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2020-12771" }, { "cve": "CVE-2020-12888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12888" } ], "notes": [ { "category": "general", "text": "The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12888", "url": "https://www.suse.com/security/cve/CVE-2020-12888" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171868 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1171868" }, { "category": "external", "summary": "SUSE Bug 1176979 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1176979" }, { "category": "external", "summary": "SUSE Bug 1179612 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1179612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2020-12888" }, { "cve": "CVE-2020-13974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13974" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13974", "url": "https://www.suse.com/security/cve/CVE-2020-13974" }, { "category": "external", "summary": "SUSE Bug 1172775 for CVE-2020-13974", "url": "https://bugzilla.suse.com/1172775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2020-13974" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14416", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14416" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14416", "url": "https://www.suse.com/security/cve/CVE-2020-14416" }, { "category": "external", "summary": "SUSE Bug 1162002 for CVE-2020-14416", "url": "https://bugzilla.suse.com/1162002" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2020-14416" }, { "cve": "CVE-2020-15393", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15393" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15393", "url": "https://www.suse.com/security/cve/CVE-2020-15393" }, { "category": "external", "summary": "SUSE Bug 1173514 for CVE-2020-15393", "url": "https://bugzilla.suse.com/1173514" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2020-15393" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "important" } ], "title": "CVE-2020-15780" }, { "cve": "CVE-2020-16166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16166" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16166", "url": "https://www.suse.com/security/cve/CVE-2020-16166" }, { "category": "external", "summary": "SUSE Bug 1174757 for CVE-2020-16166", "url": "https://bugzilla.suse.com/1174757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2020-16166" } ] }
opensuse-su-2024:13704-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
kernel-devel-longterm-6.6.17-1.1 on GA media
Notes
Title of the patch
kernel-devel-longterm-6.6.17-1.1 on GA media
Description of the patch
These are all security issues fixed in the kernel-devel-longterm-6.6.17-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-13704
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "kernel-devel-longterm-6.6.17-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the kernel-devel-longterm-6.6.17-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-13704", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13704-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3695 page", "url": "https://www.suse.com/security/cve/CVE-2016-3695/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000251 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000251/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12153 page", "url": "https://www.suse.com/security/cve/CVE-2017-12153/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13080 page", "url": "https://www.suse.com/security/cve/CVE-2017-13080/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14051 page", "url": "https://www.suse.com/security/cve/CVE-2017-14051/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15129 page", "url": "https://www.suse.com/security/cve/CVE-2017-15129/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15265 page", "url": "https://www.suse.com/security/cve/CVE-2017-15265/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16536 page", "url": "https://www.suse.com/security/cve/CVE-2017-16536/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16537 page", "url": "https://www.suse.com/security/cve/CVE-2017-16537/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16645 page", "url": "https://www.suse.com/security/cve/CVE-2017-16645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16646 page", "url": "https://www.suse.com/security/cve/CVE-2017-16646/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16647 page", "url": "https://www.suse.com/security/cve/CVE-2017-16647/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16648 page", "url": "https://www.suse.com/security/cve/CVE-2017-16648/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16995 page", "url": "https://www.suse.com/security/cve/CVE-2017-16995/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16996 page", "url": "https://www.suse.com/security/cve/CVE-2017-16996/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17448 page", "url": "https://www.suse.com/security/cve/CVE-2017-17448/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17449 page", "url": "https://www.suse.com/security/cve/CVE-2017-17449/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17450 page", "url": "https://www.suse.com/security/cve/CVE-2017-17450/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17852 page", "url": "https://www.suse.com/security/cve/CVE-2017-17852/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17853 page", "url": "https://www.suse.com/security/cve/CVE-2017-17853/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17854 page", "url": "https://www.suse.com/security/cve/CVE-2017-17854/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17855 page", "url": "https://www.suse.com/security/cve/CVE-2017-17855/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17856 page", "url": "https://www.suse.com/security/cve/CVE-2017-17856/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17857 page", "url": "https://www.suse.com/security/cve/CVE-2017-17857/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17862 page", "url": "https://www.suse.com/security/cve/CVE-2017-17862/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5123 page", "url": "https://www.suse.com/security/cve/CVE-2017-5123/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5715 page", "url": "https://www.suse.com/security/cve/CVE-2017-5715/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5754 page", "url": "https://www.suse.com/security/cve/CVE-2017-5754/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7541 page", "url": "https://www.suse.com/security/cve/CVE-2017-7541/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7542 page", "url": "https://www.suse.com/security/cve/CVE-2017-7542/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8824 page", "url": "https://www.suse.com/security/cve/CVE-2017-8824/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8831 page", "url": "https://www.suse.com/security/cve/CVE-2017-8831/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10322 page", "url": "https://www.suse.com/security/cve/CVE-2018-10322/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10323 page", "url": "https://www.suse.com/security/cve/CVE-2018-10323/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1118 page", "url": "https://www.suse.com/security/cve/CVE-2018-1118/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12232 page", "url": "https://www.suse.com/security/cve/CVE-2018-12232/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12714 page", "url": "https://www.suse.com/security/cve/CVE-2018-12714/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13053 page", "url": "https://www.suse.com/security/cve/CVE-2018-13053/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18710 page", "url": "https://www.suse.com/security/cve/CVE-2018-18710/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19824 page", "url": "https://www.suse.com/security/cve/CVE-2018-19824/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5332 page", "url": "https://www.suse.com/security/cve/CVE-2018-5332/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5333 page", "url": "https://www.suse.com/security/cve/CVE-2018-5333/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8043 page", "url": "https://www.suse.com/security/cve/CVE-2018-8043/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8087 page", "url": "https://www.suse.com/security/cve/CVE-2018-8087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8822 page", "url": "https://www.suse.com/security/cve/CVE-2018-8822/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10207 page", "url": "https://www.suse.com/security/cve/CVE-2019-10207/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11477 page", "url": "https://www.suse.com/security/cve/CVE-2019-11477/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11478 page", "url": "https://www.suse.com/security/cve/CVE-2019-11478/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11479 page", "url": "https://www.suse.com/security/cve/CVE-2019-11479/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14615 page", "url": "https://www.suse.com/security/cve/CVE-2019-14615/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14814 page", "url": "https://www.suse.com/security/cve/CVE-2019-14814/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14896 page", "url": "https://www.suse.com/security/cve/CVE-2019-14896/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15030 page", "url": "https://www.suse.com/security/cve/CVE-2019-15030/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15031 page", "url": "https://www.suse.com/security/cve/CVE-2019-15031/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15098 page", "url": "https://www.suse.com/security/cve/CVE-2019-15098/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15099 page", "url": "https://www.suse.com/security/cve/CVE-2019-15099/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15290 page", "url": "https://www.suse.com/security/cve/CVE-2019-15290/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15504 page", "url": "https://www.suse.com/security/cve/CVE-2019-15504/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15902 page", "url": "https://www.suse.com/security/cve/CVE-2019-15902/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16231 page", "url": "https://www.suse.com/security/cve/CVE-2019-16231/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16232 page", "url": "https://www.suse.com/security/cve/CVE-2019-16232/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16234 page", "url": "https://www.suse.com/security/cve/CVE-2019-16234/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17133 page", "url": "https://www.suse.com/security/cve/CVE-2019-17133/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17666 page", "url": "https://www.suse.com/security/cve/CVE-2019-17666/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18808 page", "url": "https://www.suse.com/security/cve/CVE-2019-18808/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18812 page", "url": "https://www.suse.com/security/cve/CVE-2019-18812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18813 page", "url": "https://www.suse.com/security/cve/CVE-2019-18813/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19252 page", "url": "https://www.suse.com/security/cve/CVE-2019-19252/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19332 page", "url": "https://www.suse.com/security/cve/CVE-2019-19332/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19338 page", "url": "https://www.suse.com/security/cve/CVE-2019-19338/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3016 page", "url": "https://www.suse.com/security/cve/CVE-2019-3016/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3846 page", "url": "https://www.suse.com/security/cve/CVE-2019-3846/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3882 page", "url": "https://www.suse.com/security/cve/CVE-2019-3882/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3887 page", "url": "https://www.suse.com/security/cve/CVE-2019-3887/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8564 page", "url": "https://www.suse.com/security/cve/CVE-2019-8564/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8912 page", "url": "https://www.suse.com/security/cve/CVE-2019-8912/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9500 page", "url": "https://www.suse.com/security/cve/CVE-2019-9500/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14386 page", "url": "https://www.suse.com/security/cve/CVE-2020-14386/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24586 page", "url": "https://www.suse.com/security/cve/CVE-2020-24586/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24587 page", "url": "https://www.suse.com/security/cve/CVE-2020-24587/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24588 page", "url": "https://www.suse.com/security/cve/CVE-2020-24588/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25639 page", "url": "https://www.suse.com/security/cve/CVE-2020-25639/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26141 page", "url": "https://www.suse.com/security/cve/CVE-2020-26141/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2732 page", "url": "https://www.suse.com/security/cve/CVE-2020-2732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29660 page", "url": "https://www.suse.com/security/cve/CVE-2020-29660/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29661 page", "url": "https://www.suse.com/security/cve/CVE-2020-29661/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8648 page", "url": "https://www.suse.com/security/cve/CVE-2020-8648/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8694 page", "url": "https://www.suse.com/security/cve/CVE-2020-8694/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26708 page", "url": "https://www.suse.com/security/cve/CVE-2021-26708/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-28971 page", "url": "https://www.suse.com/security/cve/CVE-2021-28971/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32606 page", "url": "https://www.suse.com/security/cve/CVE-2021-32606/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33909 page", "url": "https://www.suse.com/security/cve/CVE-2021-33909/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3483 page", "url": "https://www.suse.com/security/cve/CVE-2021-3483/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3489 page", "url": "https://www.suse.com/security/cve/CVE-2021-3489/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3490 page", "url": "https://www.suse.com/security/cve/CVE-2021-3490/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3491 page", "url": "https://www.suse.com/security/cve/CVE-2021-3491/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3542 page", "url": "https://www.suse.com/security/cve/CVE-2021-3542/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3640 page", "url": "https://www.suse.com/security/cve/CVE-2021-3640/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3653 page", "url": "https://www.suse.com/security/cve/CVE-2021-3653/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3656 page", "url": "https://www.suse.com/security/cve/CVE-2021-3656/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3744 page", "url": "https://www.suse.com/security/cve/CVE-2021-3744/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3753 page", "url": "https://www.suse.com/security/cve/CVE-2021-3753/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37576 page", "url": "https://www.suse.com/security/cve/CVE-2021-37576/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3759 page", "url": "https://www.suse.com/security/cve/CVE-2021-3759/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38166 page", "url": "https://www.suse.com/security/cve/CVE-2021-38166/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43976 page", "url": "https://www.suse.com/security/cve/CVE-2021-43976/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0185 page", "url": "https://www.suse.com/security/cve/CVE-2022-0185/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0330 page", "url": "https://www.suse.com/security/cve/CVE-2022-0330/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0847 page", "url": "https://www.suse.com/security/cve/CVE-2022-0847/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0886 page", "url": "https://www.suse.com/security/cve/CVE-2022-0886/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1462 page", "url": "https://www.suse.com/security/cve/CVE-2022-1462/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1516 page", "url": "https://www.suse.com/security/cve/CVE-2022-1516/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1679 page", "url": "https://www.suse.com/security/cve/CVE-2022-1679/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1729 page", "url": "https://www.suse.com/security/cve/CVE-2022-1729/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1852 page", "url": "https://www.suse.com/security/cve/CVE-2022-1852/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1966 page", "url": "https://www.suse.com/security/cve/CVE-2022-1966/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1972 page", "url": "https://www.suse.com/security/cve/CVE-2022-1972/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1973 page", "url": "https://www.suse.com/security/cve/CVE-2022-1973/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-22942 page", "url": "https://www.suse.com/security/cve/CVE-2022-22942/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2308 page", "url": "https://www.suse.com/security/cve/CVE-2022-2308/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24958 page", "url": "https://www.suse.com/security/cve/CVE-2022-24958/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2588 page", "url": "https://www.suse.com/security/cve/CVE-2022-2588/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2590 page", "url": "https://www.suse.com/security/cve/CVE-2022-2590/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26490 page", "url": "https://www.suse.com/security/cve/CVE-2022-26490/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28388 page", "url": "https://www.suse.com/security/cve/CVE-2022-28388/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28389 page", "url": "https://www.suse.com/security/cve/CVE-2022-28389/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28390 page", "url": "https://www.suse.com/security/cve/CVE-2022-28390/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28893 page", "url": "https://www.suse.com/security/cve/CVE-2022-28893/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29900 page", "url": "https://www.suse.com/security/cve/CVE-2022-29900/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29901 page", "url": "https://www.suse.com/security/cve/CVE-2022-29901/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29968 page", "url": "https://www.suse.com/security/cve/CVE-2022-29968/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3424 page", "url": "https://www.suse.com/security/cve/CVE-2022-3424/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34918 page", "url": "https://www.suse.com/security/cve/CVE-2022-34918/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3628 page", "url": "https://www.suse.com/security/cve/CVE-2022-3628/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3640 page", "url": "https://www.suse.com/security/cve/CVE-2022-3640/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-40982 page", "url": "https://www.suse.com/security/cve/CVE-2022-40982/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-41218 page", "url": "https://www.suse.com/security/cve/CVE-2022-41218/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-41674 page", "url": "https://www.suse.com/security/cve/CVE-2022-41674/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-42719 page", "url": "https://www.suse.com/security/cve/CVE-2022-42719/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-42720 page", "url": "https://www.suse.com/security/cve/CVE-2022-42720/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-42721 page", "url": "https://www.suse.com/security/cve/CVE-2022-42721/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-42722 page", "url": "https://www.suse.com/security/cve/CVE-2022-42722/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4379 page", "url": "https://www.suse.com/security/cve/CVE-2022-4379/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-44032 page", "url": "https://www.suse.com/security/cve/CVE-2022-44032/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-44033 page", "url": "https://www.suse.com/security/cve/CVE-2022-44033/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-44034 page", "url": "https://www.suse.com/security/cve/CVE-2022-44034/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45884 page", "url": "https://www.suse.com/security/cve/CVE-2022-45884/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45885 page", "url": "https://www.suse.com/security/cve/CVE-2022-45885/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45886 page", "url": "https://www.suse.com/security/cve/CVE-2022-45886/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45887 page", "url": "https://www.suse.com/security/cve/CVE-2022-45887/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45888 page", "url": "https://www.suse.com/security/cve/CVE-2022-45888/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45919 page", "url": "https://www.suse.com/security/cve/CVE-2022-45919/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45934 page", "url": "https://www.suse.com/security/cve/CVE-2022-45934/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0045 page", "url": "https://www.suse.com/security/cve/CVE-2023-0045/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1076 page", "url": "https://www.suse.com/security/cve/CVE-2023-1076/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1078 page", "url": "https://www.suse.com/security/cve/CVE-2023-1078/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1192 page", "url": "https://www.suse.com/security/cve/CVE-2023-1192/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1380 page", "url": "https://www.suse.com/security/cve/CVE-2023-1380/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-20569 page", "url": "https://www.suse.com/security/cve/CVE-2023-20569/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-20593 page", "url": "https://www.suse.com/security/cve/CVE-2023-20593/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2124 page", "url": "https://www.suse.com/security/cve/CVE-2023-2124/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31084 page", "url": "https://www.suse.com/security/cve/CVE-2023-31084/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3141 page", "url": "https://www.suse.com/security/cve/CVE-2023-3141/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3269 page", "url": "https://www.suse.com/security/cve/CVE-2023-3269/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-39192 page", "url": "https://www.suse.com/security/cve/CVE-2023-39192/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-39193 page", "url": "https://www.suse.com/security/cve/CVE-2023-39193/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4128 page", "url": "https://www.suse.com/security/cve/CVE-2023-4128/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4134 page", "url": "https://www.suse.com/security/cve/CVE-2023-4134/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4194 page", "url": "https://www.suse.com/security/cve/CVE-2023-4194/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42753 page", "url": "https://www.suse.com/security/cve/CVE-2023-42753/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42754 page", "url": "https://www.suse.com/security/cve/CVE-2023-42754/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42756 page", "url": "https://www.suse.com/security/cve/CVE-2023-42756/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4623 page", "url": "https://www.suse.com/security/cve/CVE-2023-4623/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-46813 page", "url": "https://www.suse.com/security/cve/CVE-2023-46813/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4881 page", "url": "https://www.suse.com/security/cve/CVE-2023-4881/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-5345 page", "url": "https://www.suse.com/security/cve/CVE-2023-5345/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6606 page", "url": "https://www.suse.com/security/cve/CVE-2023-6606/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6610 page", "url": "https://www.suse.com/security/cve/CVE-2023-6610/" } ], "title": "kernel-devel-longterm-6.6.17-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:13704-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-longterm-6.6.17-1.1.aarch64", "product": { "name": "kernel-devel-longterm-6.6.17-1.1.aarch64", "product_id": "kernel-devel-longterm-6.6.17-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-source-longterm-6.6.17-1.1.aarch64", "product": { "name": "kernel-source-longterm-6.6.17-1.1.aarch64", "product_id": "kernel-source-longterm-6.6.17-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-longterm-6.6.17-1.1.ppc64le", "product": { "name": "kernel-devel-longterm-6.6.17-1.1.ppc64le", "product_id": "kernel-devel-longterm-6.6.17-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-source-longterm-6.6.17-1.1.ppc64le", "product": { "name": "kernel-source-longterm-6.6.17-1.1.ppc64le", "product_id": "kernel-source-longterm-6.6.17-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-longterm-6.6.17-1.1.s390x", "product": { "name": "kernel-devel-longterm-6.6.17-1.1.s390x", "product_id": "kernel-devel-longterm-6.6.17-1.1.s390x" } }, { "category": "product_version", "name": "kernel-source-longterm-6.6.17-1.1.s390x", "product": { "name": "kernel-source-longterm-6.6.17-1.1.s390x", "product_id": "kernel-source-longterm-6.6.17-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-longterm-6.6.17-1.1.x86_64", "product": { "name": "kernel-devel-longterm-6.6.17-1.1.x86_64", "product_id": "kernel-devel-longterm-6.6.17-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-longterm-6.6.17-1.1.x86_64", "product": { "name": "kernel-source-longterm-6.6.17-1.1.x86_64", "product_id": "kernel-source-longterm-6.6.17-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-longterm-6.6.17-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64" }, "product_reference": "kernel-devel-longterm-6.6.17-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-longterm-6.6.17-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le" }, "product_reference": "kernel-devel-longterm-6.6.17-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-longterm-6.6.17-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x" }, "product_reference": "kernel-devel-longterm-6.6.17-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-longterm-6.6.17-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64" }, "product_reference": "kernel-devel-longterm-6.6.17-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-longterm-6.6.17-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64" }, "product_reference": "kernel-source-longterm-6.6.17-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-longterm-6.6.17-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le" }, "product_reference": "kernel-source-longterm-6.6.17-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-longterm-6.6.17-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x" }, "product_reference": "kernel-source-longterm-6.6.17-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-longterm-6.6.17-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" }, "product_reference": "kernel-source-longterm-6.6.17-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-3695", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3695" } ], "notes": [ { "category": "general", "text": "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3695", "url": "https://www.suse.com/security/cve/CVE-2016-3695" }, { "category": "external", "summary": "SUSE Bug 1023051 for CVE-2016-3695", "url": "https://bugzilla.suse.com/1023051" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-3695" }, { "cve": "CVE-2017-1000251", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000251" } ], "notes": [ { "category": "general", "text": "The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000251", "url": "https://www.suse.com/security/cve/CVE-2017-1000251" }, { "category": "external", "summary": "SUSE Bug 1057389 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1057389" }, { "category": "external", "summary": "SUSE Bug 1057950 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1057950" }, { "category": "external", "summary": "SUSE Bug 1070535 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1070535" }, { "category": "external", "summary": "SUSE Bug 1072117 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1072117" }, { "category": "external", "summary": "SUSE Bug 1072162 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1072162" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-1000251" }, { "cve": "CVE-2017-12153", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12153" } ], "notes": [ { "category": "general", "text": "A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12153", "url": "https://www.suse.com/security/cve/CVE-2017-12153" }, { "category": "external", "summary": "SUSE Bug 1058410 for CVE-2017-12153", "url": "https://bugzilla.suse.com/1058410" }, { "category": "external", "summary": "SUSE Bug 1058624 for CVE-2017-12153", "url": "https://bugzilla.suse.com/1058624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-12153" }, { "cve": "CVE-2017-13080", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13080" } ], "notes": [ { "category": "general", "text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13080", "url": "https://www.suse.com/security/cve/CVE-2017-13080" }, { "category": "external", "summary": "SUSE Bug 1056061 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1056061" }, { "category": "external", "summary": "SUSE Bug 1063479 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063479" }, { "category": "external", "summary": "SUSE Bug 1063667 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063667" }, { "category": "external", "summary": "SUSE Bug 1063671 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063671" }, { "category": "external", "summary": "SUSE Bug 1066295 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1066295" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1178872 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1178872" }, { "category": "external", "summary": "SUSE Bug 1179588 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1179588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-13080" }, { "cve": "CVE-2017-14051", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14051" } ], "notes": [ { "category": "general", "text": "An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14051", "url": "https://www.suse.com/security/cve/CVE-2017-14051" }, { "category": "external", "summary": "SUSE Bug 1056588 for CVE-2017-14051", "url": "https://bugzilla.suse.com/1056588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-14051" }, { "cve": "CVE-2017-15129", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15129" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15129", "url": "https://www.suse.com/security/cve/CVE-2017-15129" }, { "category": "external", "summary": "SUSE Bug 1074839 for CVE-2017-15129", "url": "https://bugzilla.suse.com/1074839" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-15129" }, { "cve": "CVE-2017-15265", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15265" } ], "notes": [ { "category": "general", "text": "Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15265", "url": "https://www.suse.com/security/cve/CVE-2017-15265" }, { "category": "external", "summary": "SUSE Bug 1062520 for CVE-2017-15265", "url": "https://bugzilla.suse.com/1062520" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-15265", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2017-15265" }, { "cve": "CVE-2017-16536", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16536" } ], "notes": [ { "category": "general", "text": "The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16536", "url": "https://www.suse.com/security/cve/CVE-2017-16536" }, { "category": "external", "summary": "SUSE Bug 1066606 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1066606" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16536" }, { "cve": "CVE-2017-16537", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16537" } ], "notes": [ { "category": "general", "text": "The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16537", "url": "https://www.suse.com/security/cve/CVE-2017-16537" }, { "category": "external", "summary": "SUSE Bug 1066573 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1066573" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16537" }, { "cve": "CVE-2017-16645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16645" } ], "notes": [ { "category": "general", "text": "The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16645", "url": "https://www.suse.com/security/cve/CVE-2017-16645" }, { "category": "external", "summary": "SUSE Bug 1067132 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1067132" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16645" }, { "cve": "CVE-2017-16646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16646" } ], "notes": [ { "category": "general", "text": "drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16646", "url": "https://www.suse.com/security/cve/CVE-2017-16646" }, { "category": "external", "summary": "SUSE Bug 1067105 for CVE-2017-16646", "url": "https://bugzilla.suse.com/1067105" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16646", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16646" }, { "cve": "CVE-2017-16647", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16647" } ], "notes": [ { "category": "general", "text": "drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16647", "url": "https://www.suse.com/security/cve/CVE-2017-16647" }, { "category": "external", "summary": "SUSE Bug 1067102 for CVE-2017-16647", "url": "https://bugzilla.suse.com/1067102" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16647", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16647" }, { "cve": "CVE-2017-16648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16648" } ], "notes": [ { "category": "general", "text": "The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16648", "url": "https://www.suse.com/security/cve/CVE-2017-16648" }, { "category": "external", "summary": "SUSE Bug 1067087 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1067087" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16648" }, { "cve": "CVE-2017-16995", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16995" } ], "notes": [ { "category": "general", "text": "The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16995", "url": "https://www.suse.com/security/cve/CVE-2017-16995" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-16995", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16995" }, { "cve": "CVE-2017-16996", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16996" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16996", "url": "https://www.suse.com/security/cve/CVE-2017-16996" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-16996", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16996" }, { "cve": "CVE-2017-17448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17448" } ], "notes": [ { "category": "general", "text": "net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17448", "url": "https://www.suse.com/security/cve/CVE-2017-17448" }, { "category": "external", "summary": "SUSE Bug 1071693 for CVE-2017-17448", "url": "https://bugzilla.suse.com/1071693" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17448" }, { "cve": "CVE-2017-17449", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17449" } ], "notes": [ { "category": "general", "text": "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17449", "url": "https://www.suse.com/security/cve/CVE-2017-17449" }, { "category": "external", "summary": "SUSE Bug 1071694 for CVE-2017-17449", "url": "https://bugzilla.suse.com/1071694" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17449" }, { "cve": "CVE-2017-17450", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17450" } ], "notes": [ { "category": "general", "text": "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17450", "url": "https://www.suse.com/security/cve/CVE-2017-17450" }, { "category": "external", "summary": "SUSE Bug 1071695 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1071695" }, { "category": "external", "summary": "SUSE Bug 1074033 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1074033" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17450" }, { "cve": "CVE-2017-17852", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17852" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17852", "url": "https://www.suse.com/security/cve/CVE-2017-17852" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17852", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17852" }, { "cve": "CVE-2017-17853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17853" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17853", "url": "https://www.suse.com/security/cve/CVE-2017-17853" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17853", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17853" }, { "cve": "CVE-2017-17854", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17854" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17854", "url": "https://www.suse.com/security/cve/CVE-2017-17854" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17854", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17854" }, { "cve": "CVE-2017-17855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17855" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17855", "url": "https://www.suse.com/security/cve/CVE-2017-17855" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17855", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17855" }, { "cve": "CVE-2017-17856", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17856" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17856", "url": "https://www.suse.com/security/cve/CVE-2017-17856" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17856", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17856" }, { "cve": "CVE-2017-17857", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17857" } ], "notes": [ { "category": "general", "text": "The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17857", "url": "https://www.suse.com/security/cve/CVE-2017-17857" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17857", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17857" }, { "cve": "CVE-2017-17862", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17862" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17862", "url": "https://www.suse.com/security/cve/CVE-2017-17862" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17862", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17862" }, { "cve": "CVE-2017-5123", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5123" } ], "notes": [ { "category": "general", "text": "Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5123", "url": "https://www.suse.com/security/cve/CVE-2017-5123" }, { "category": "external", "summary": "SUSE Bug 1062473 for CVE-2017-5123", "url": "https://bugzilla.suse.com/1062473" }, { "category": "external", "summary": "SUSE Bug 1122971 for CVE-2017-5123", "url": "https://bugzilla.suse.com/1122971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5123" }, { "cve": "CVE-2017-5715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5715" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5715", "url": "https://www.suse.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1074741 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074741" }, { "category": "external", "summary": "SUSE Bug 1074919 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074919" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075007 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075007" }, { "category": "external", "summary": "SUSE Bug 1075262 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075262" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1076115 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076115" }, { "category": "external", "summary": "SUSE Bug 1076372 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076372" }, { "category": "external", "summary": "SUSE Bug 1076606 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076606" }, { "category": "external", "summary": "SUSE Bug 1078353 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1078353" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087887 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087887" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1088147 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1088147" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1095735 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1095735" }, { "category": "external", "summary": "SUSE Bug 1102517 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1102517" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1126516 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1126516" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201457 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201457" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1203236 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1203236" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5715" }, { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2017-5754", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5754" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5754", "url": "https://www.suse.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075008 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1075008" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1115045 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1115045" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-5754" }, { "cve": "CVE-2017-7541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7541" } ], "notes": [ { "category": "general", "text": "The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7541", "url": "https://www.suse.com/security/cve/CVE-2017-7541" }, { "category": "external", "summary": "SUSE Bug 1049645 for CVE-2017-7541", "url": "https://bugzilla.suse.com/1049645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-7541" }, { "cve": "CVE-2017-7542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7542" } ], "notes": [ { "category": "general", "text": "The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7542", "url": "https://www.suse.com/security/cve/CVE-2017-7542" }, { "category": "external", "summary": "SUSE Bug 1049882 for CVE-2017-7542", "url": "https://bugzilla.suse.com/1049882" }, { "category": "external", "summary": "SUSE Bug 1061936 for CVE-2017-7542", "url": "https://bugzilla.suse.com/1061936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-7542" }, { "cve": "CVE-2017-8824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8824" } ], "notes": [ { "category": "general", "text": "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8824", "url": "https://www.suse.com/security/cve/CVE-2017-8824" }, { "category": "external", "summary": "SUSE Bug 1070771 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1070771" }, { "category": "external", "summary": "SUSE Bug 1076734 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1076734" }, { "category": "external", "summary": "SUSE Bug 1092904 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1092904" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-8824" }, { "cve": "CVE-2017-8831", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8831" } ], "notes": [ { "category": "general", "text": "The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8831", "url": "https://www.suse.com/security/cve/CVE-2017-8831" }, { "category": "external", "summary": "SUSE Bug 1037994 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1037994" }, { "category": "external", "summary": "SUSE Bug 1061936 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1061936" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-8831" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-10322", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10322" } ], "notes": [ { "category": "general", "text": "The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10322", "url": "https://www.suse.com/security/cve/CVE-2018-10322" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10322", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090749 for CVE-2018-10322", "url": "https://bugzilla.suse.com/1090749" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10322" }, { "cve": "CVE-2018-10323", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10323" } ], "notes": [ { "category": "general", "text": "The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10323", "url": "https://www.suse.com/security/cve/CVE-2018-10323" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10323", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090717 for CVE-2018-10323", "url": "https://bugzilla.suse.com/1090717" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10323" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-1118", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1118" } ], "notes": [ { "category": "general", "text": "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1118", "url": "https://www.suse.com/security/cve/CVE-2018-1118" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1118", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092472 for CVE-2018-1118", "url": "https://bugzilla.suse.com/1092472" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-1118" }, { "cve": "CVE-2018-12232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12232" } ], "notes": [ { "category": "general", "text": "In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat\u0027s execution, leading to a NULL pointer dereference and system crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12232", "url": "https://www.suse.com/security/cve/CVE-2018-12232" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097593 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1097593" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1127757 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1127757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-12232" }, { "cve": "CVE-2018-12714", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12714" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via crafted perf_event_open and mmap system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12714", "url": "https://www.suse.com/security/cve/CVE-2018-12714" }, { "category": "external", "summary": "SUSE Bug 1098933 for CVE-2018-12714", "url": "https://bugzilla.suse.com/1098933" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12714" }, { "cve": "CVE-2018-13053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13053" } ], "notes": [ { "category": "general", "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13053", "url": "https://www.suse.com/security/cve/CVE-2018-13053" }, { "category": "external", "summary": "SUSE Bug 1099924 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1099924" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-13053" }, { "cve": "CVE-2018-18710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-18710" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-18710", "url": "https://www.suse.com/security/cve/CVE-2018-18710" }, { "category": "external", "summary": "SUSE Bug 1113751 for CVE-2018-18710", "url": "https://bugzilla.suse.com/1113751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-18710" }, { "cve": "CVE-2018-19824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19824" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19824", "url": "https://www.suse.com/security/cve/CVE-2018-19824" }, { "category": "external", "summary": "SUSE Bug 1118152 for CVE-2018-19824", "url": "https://bugzilla.suse.com/1118152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19824" }, { "cve": "CVE-2018-5332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5332" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5332", "url": "https://www.suse.com/security/cve/CVE-2018-5332" }, { "category": "external", "summary": "SUSE Bug 1075621 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1075621" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-5332" }, { "cve": "CVE-2018-5333", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5333" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5333", "url": "https://www.suse.com/security/cve/CVE-2018-5333" }, { "category": "external", "summary": "SUSE Bug 1075617 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1075617" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-5333" }, { "cve": "CVE-2018-8043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8043" } ], "notes": [ { "category": "general", "text": "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8043", "url": "https://www.suse.com/security/cve/CVE-2018-8043" }, { "category": "external", "summary": "SUSE Bug 1084829 for CVE-2018-8043", "url": "https://bugzilla.suse.com/1084829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 0, "baseSeverity": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-8043" }, { "cve": "CVE-2018-8087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8087" } ], "notes": [ { "category": "general", "text": "Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8087", "url": "https://www.suse.com/security/cve/CVE-2018-8087" }, { "category": "external", "summary": "SUSE Bug 1085053 for CVE-2018-8087", "url": "https://bugzilla.suse.com/1085053" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-8087" }, { "cve": "CVE-2018-8822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8822" } ], "notes": [ { "category": "general", "text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8822", "url": "https://www.suse.com/security/cve/CVE-2018-8822" }, { "category": "external", "summary": "SUSE Bug 1086162 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1086162" }, { "category": "external", "summary": "SUSE Bug 1090404 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1090404" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-8822" }, { "cve": "CVE-2019-10207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10207" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10207", "url": "https://www.suse.com/security/cve/CVE-2019-10207" }, { "category": "external", "summary": "SUSE Bug 1123959 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1123959" }, { "category": "external", "summary": "SUSE Bug 1142857 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1142857" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-10207" }, { "cve": "CVE-2019-11477", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11477" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11477", "url": "https://www.suse.com/security/cve/CVE-2019-11477" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1153242 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1153242" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11477" }, { "cve": "CVE-2019-11478", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11478" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11478", "url": "https://www.suse.com/security/cve/CVE-2019-11478" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11478" }, { "cve": "CVE-2019-11479", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11479" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11479", "url": "https://www.suse.com/security/cve/CVE-2019-11479" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11479" }, { "cve": "CVE-2019-14615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14615" } ], "notes": [ { "category": "general", "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14615", "url": "https://www.suse.com/security/cve/CVE-2019-14615" }, { "category": "external", "summary": "SUSE Bug 1160195 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1160195" }, { "category": "external", "summary": "SUSE Bug 1165881 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1165881" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-14615" }, { "cve": "CVE-2019-14814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14814" } ], "notes": [ { "category": "general", "text": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14814", "url": "https://www.suse.com/security/cve/CVE-2019-14814" }, { "category": "external", "summary": "SUSE Bug 1146512 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1146512" }, { "category": "external", "summary": "SUSE Bug 1173664 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173664" }, { "category": "external", "summary": "SUSE Bug 1173665 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-14814" }, { "cve": "CVE-2019-14896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14896" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14896", "url": "https://www.suse.com/security/cve/CVE-2019-14896" }, { "category": "external", "summary": "SUSE Bug 1157157 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1157157" }, { "category": "external", "summary": "SUSE Bug 1160468 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1160468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-14896" }, { "cve": "CVE-2019-15030", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15030" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15030", "url": "https://www.suse.com/security/cve/CVE-2019-15030" }, { "category": "external", "summary": "SUSE Bug 1149713 for CVE-2019-15030", "url": "https://bugzilla.suse.com/1149713" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15030" }, { "cve": "CVE-2019-15031", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15031" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15031", "url": "https://www.suse.com/security/cve/CVE-2019-15031" }, { "category": "external", "summary": "SUSE Bug 1149713 for CVE-2019-15031", "url": "https://bugzilla.suse.com/1149713" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15031" }, { "cve": "CVE-2019-15098", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15098" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15098", "url": "https://www.suse.com/security/cve/CVE-2019-15098" }, { "category": "external", "summary": "SUSE Bug 1146378 for CVE-2019-15098", "url": "https://bugzilla.suse.com/1146378" }, { "category": "external", "summary": "SUSE Bug 1146543 for CVE-2019-15098", "url": "https://bugzilla.suse.com/1146543" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15098" }, { "cve": "CVE-2019-15099", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15099" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15099", "url": "https://www.suse.com/security/cve/CVE-2019-15099" }, { "category": "external", "summary": "SUSE Bug 1146368 for CVE-2019-15099", "url": "https://bugzilla.suse.com/1146368" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15099" }, { "cve": "CVE-2019-15290", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15290" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15290", "url": "https://www.suse.com/security/cve/CVE-2019-15290" }, { "category": "external", "summary": "SUSE Bug 1146378 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146378" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146543 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146543" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15290" }, { "cve": "CVE-2019-15504", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15504" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15504", "url": "https://www.suse.com/security/cve/CVE-2019-15504" }, { "category": "external", "summary": "SUSE Bug 1147116 for CVE-2019-15504", "url": "https://bugzilla.suse.com/1147116" }, { "category": "external", "summary": "SUSE Bug 1185852 for CVE-2019-15504", "url": "https://bugzilla.suse.com/1185852" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-15504" }, { "cve": "CVE-2019-15902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15902" } ], "notes": [ { "category": "general", "text": "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15902", "url": "https://www.suse.com/security/cve/CVE-2019-15902" }, { "category": "external", "summary": "SUSE Bug 1149376 for CVE-2019-15902", "url": "https://bugzilla.suse.com/1149376" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-15902", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15902" }, { "cve": "CVE-2019-16231", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16231" } ], "notes": [ { "category": "general", "text": "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16231", "url": "https://www.suse.com/security/cve/CVE-2019-16231" }, { "category": "external", "summary": "SUSE Bug 1150466 for CVE-2019-16231", "url": "https://bugzilla.suse.com/1150466" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-16231" }, { "cve": "CVE-2019-16232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16232" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16232", "url": "https://www.suse.com/security/cve/CVE-2019-16232" }, { "category": "external", "summary": "SUSE Bug 1150465 for CVE-2019-16232", "url": "https://bugzilla.suse.com/1150465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-16232" }, { "cve": "CVE-2019-16234", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16234" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16234", "url": "https://www.suse.com/security/cve/CVE-2019-16234" }, { "category": "external", "summary": "SUSE Bug 1150452 for CVE-2019-16234", "url": "https://bugzilla.suse.com/1150452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-16234" }, { "cve": "CVE-2019-17133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17133" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17133", "url": "https://www.suse.com/security/cve/CVE-2019-17133" }, { "category": "external", "summary": "SUSE Bug 1153158 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153158" }, { "category": "external", "summary": "SUSE Bug 1153161 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-17133" }, { "cve": "CVE-2019-17666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17666" } ], "notes": [ { "category": "general", "text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17666", "url": "https://www.suse.com/security/cve/CVE-2019-17666" }, { "category": "external", "summary": "SUSE Bug 1154372 for CVE-2019-17666", "url": "https://bugzilla.suse.com/1154372" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-17666" }, { "cve": "CVE-2019-18808", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18808" } ], "notes": [ { "category": "general", "text": "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18808", "url": "https://www.suse.com/security/cve/CVE-2019-18808" }, { "category": "external", "summary": "SUSE Bug 1156259 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1156259" }, { "category": "external", "summary": "SUSE Bug 1189884 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1189884" }, { "category": "external", "summary": "SUSE Bug 1190534 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1190534" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18808" }, { "cve": "CVE-2019-18812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18812" } ], "notes": [ { "category": "general", "text": "A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18812", "url": "https://www.suse.com/security/cve/CVE-2019-18812" }, { "category": "external", "summary": "SUSE Bug 1156277 for CVE-2019-18812", "url": "https://bugzilla.suse.com/1156277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18812" }, { "cve": "CVE-2019-18813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18813" } ], "notes": [ { "category": "general", "text": "A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18813", "url": "https://www.suse.com/security/cve/CVE-2019-18813" }, { "category": "external", "summary": "SUSE Bug 1156278 for CVE-2019-18813", "url": "https://bugzilla.suse.com/1156278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18813" }, { "cve": "CVE-2019-19252", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19252" } ], "notes": [ { "category": "general", "text": "vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19252", "url": "https://www.suse.com/security/cve/CVE-2019-19252" }, { "category": "external", "summary": "SUSE Bug 1157813 for CVE-2019-19252", "url": "https://bugzilla.suse.com/1157813" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19252" }, { "cve": "CVE-2019-19332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19332" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19332", "url": "https://www.suse.com/security/cve/CVE-2019-19332" }, { "category": "external", "summary": "SUSE Bug 1158827 for CVE-2019-19332", "url": "https://bugzilla.suse.com/1158827" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19332" }, { "cve": "CVE-2019-19338", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19338" } ], "notes": [ { "category": "general", "text": "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has \u0027TSX\u0027 enabled. Confidentiality of data is the highest threat associated with this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19338", "url": "https://www.suse.com/security/cve/CVE-2019-19338" }, { "category": "external", "summary": "SUSE Bug 1158954 for CVE-2019-19338", "url": "https://bugzilla.suse.com/1158954" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19338" }, { "cve": "CVE-2019-3016", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3016" } ], "notes": [ { "category": "general", "text": "In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3016", "url": "https://www.suse.com/security/cve/CVE-2019-3016" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2019-3016", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1161154 for CVE-2019-3016", "url": "https://bugzilla.suse.com/1161154" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3016" }, { "cve": "CVE-2019-3846", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3846" } ], "notes": [ { "category": "general", "text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3846", "url": "https://www.suse.com/security/cve/CVE-2019-3846" }, { "category": "external", "summary": "SUSE Bug 1136424 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136424" }, { "category": "external", "summary": "SUSE Bug 1136446 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136446" }, { "category": "external", "summary": "SUSE Bug 1156330 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1156330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3846" }, { "cve": "CVE-2019-3882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3882" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3882", "url": "https://www.suse.com/security/cve/CVE-2019-3882" }, { "category": "external", "summary": "SUSE Bug 1131416 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131416" }, { "category": "external", "summary": "SUSE Bug 1131427 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131427" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1133319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3882" }, { "cve": "CVE-2019-3887", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3887" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0\u0027s APIC register values via L2 guest, when \u0027virtualize x2APIC mode\u0027 is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3887", "url": "https://www.suse.com/security/cve/CVE-2019-3887" }, { "category": "external", "summary": "SUSE Bug 1131800 for CVE-2019-3887", "url": "https://bugzilla.suse.com/1131800" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3887" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-7222" }, { "cve": "CVE-2019-8564", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8564" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8564", "url": "https://www.suse.com/security/cve/CVE-2019-8564" }, { "category": "external", "summary": "SUSE Bug 1132673 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132673" }, { "category": "external", "summary": "SUSE Bug 1132828 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132828" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-8564" }, { "cve": "CVE-2019-8912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8912" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8912", "url": "https://www.suse.com/security/cve/CVE-2019-8912" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1126284 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1126284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-8912" }, { "cve": "CVE-2019-9500", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9500" } ], "notes": [ { "category": "general", "text": "The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9500", "url": "https://www.suse.com/security/cve/CVE-2019-9500" }, { "category": "external", "summary": "SUSE Bug 1132681 for CVE-2019-9500", "url": "https://bugzilla.suse.com/1132681" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-9500" }, { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14386" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14386", "url": "https://www.suse.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "SUSE Bug 1176069 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176069" }, { "category": "external", "summary": "SUSE Bug 1176072 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14386" }, { "cve": "CVE-2020-24586", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24586" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24586", "url": "https://www.suse.com/security/cve/CVE-2020-24586" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24586" }, { "cve": "CVE-2020-24587", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24587" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24587", "url": "https://www.suse.com/security/cve/CVE-2020-24587" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1185862 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185862" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24587" }, { "cve": "CVE-2020-24588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24588" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24588", "url": "https://www.suse.com/security/cve/CVE-2020-24588" }, { "category": "external", "summary": "SUSE Bug 1185861 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1185861" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1192868" }, { "category": "external", "summary": "SUSE Bug 1199701 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1199701" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24588" }, { "cve": "CVE-2020-25639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25639" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25639", "url": "https://www.suse.com/security/cve/CVE-2020-25639" }, { "category": "external", "summary": "SUSE Bug 1176846 for CVE-2020-25639", "url": "https://bugzilla.suse.com/1176846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25639" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-26141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26141" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26141", "url": "https://www.suse.com/security/cve/CVE-2020-26141" }, { "category": "external", "summary": "SUSE Bug 1185987 for CVE-2020-26141", "url": "https://bugzilla.suse.com/1185987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-26141" }, { "cve": "CVE-2020-2732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2732" } ], "notes": [ { "category": "general", "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2732", "url": "https://www.suse.com/security/cve/CVE-2020-2732" }, { "category": "external", "summary": "SUSE Bug 1163971 for CVE-2020-2732", "url": "https://bugzilla.suse.com/1163971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2732" }, { "cve": "CVE-2020-29660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29660" } ], "notes": [ { "category": "general", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29660", "url": "https://www.suse.com/security/cve/CVE-2020-29660" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-29660" }, { "cve": "CVE-2020-29661", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29661" } ], "notes": [ { "category": "general", "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29661", "url": "https://www.suse.com/security/cve/CVE-2020-29661" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179877" }, { "category": "external", "summary": "SUSE Bug 1214268 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1214268" }, { "category": "external", "summary": "SUSE Bug 1218966 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1218966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-29661" }, { "cve": "CVE-2020-8648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8648" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8648", "url": "https://www.suse.com/security/cve/CVE-2020-8648" }, { "category": "external", "summary": "SUSE Bug 1162928 for CVE-2020-8648", "url": "https://bugzilla.suse.com/1162928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-8648" }, { "cve": "CVE-2020-8694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8694" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8694", "url": "https://www.suse.com/security/cve/CVE-2020-8694" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178700 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178700" }, { "category": "external", "summary": "SUSE Bug 1179661 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1179661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-8694" }, { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-23133" }, { "cve": "CVE-2021-26708", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26708" } ], "notes": [ { "category": "general", "text": "A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26708", "url": "https://www.suse.com/security/cve/CVE-2021-26708" }, { "category": "external", "summary": "SUSE Bug 1181806 for CVE-2021-26708", "url": "https://bugzilla.suse.com/1181806" }, { "category": "external", "summary": "SUSE Bug 1183298 for CVE-2021-26708", "url": "https://bugzilla.suse.com/1183298" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-26708" }, { "cve": "CVE-2021-28971", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-28971" } ], "notes": [ { "category": "general", "text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-28971", "url": "https://www.suse.com/security/cve/CVE-2021-28971" }, { "category": "external", "summary": "SUSE Bug 1184196 for CVE-2021-28971", "url": "https://bugzilla.suse.com/1184196" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-28971" }, { "cve": "CVE-2021-32606", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32606" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32606", "url": "https://www.suse.com/security/cve/CVE-2021-32606" }, { "category": "external", "summary": "SUSE Bug 1185953 for CVE-2021-32606", "url": "https://bugzilla.suse.com/1185953" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-32606" }, { "cve": "CVE-2021-33909", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33909" } ], "notes": [ { "category": "general", "text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33909", "url": "https://www.suse.com/security/cve/CVE-2021-33909" }, { "category": "external", "summary": "SUSE Bug 1188062 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188062" }, { "category": "external", "summary": "SUSE Bug 1188063 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188063" }, { "category": "external", "summary": "SUSE Bug 1188257 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188257" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1189302" }, { "category": "external", "summary": "SUSE Bug 1190859 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1190859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-33909" }, { "cve": "CVE-2021-3483", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3483" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3483", "url": "https://www.suse.com/security/cve/CVE-2021-3483" }, { "category": "external", "summary": "SUSE Bug 1184393 for CVE-2021-3483", "url": "https://bugzilla.suse.com/1184393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3483" }, { "cve": "CVE-2021-3489", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3489" } ], "notes": [ { "category": "general", "text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3489", "url": "https://www.suse.com/security/cve/CVE-2021-3489" }, { "category": "external", "summary": "SUSE Bug 1185640 for CVE-2021-3489", "url": "https://bugzilla.suse.com/1185640" }, { "category": "external", "summary": "SUSE Bug 1185856 for CVE-2021-3489", "url": "https://bugzilla.suse.com/1185856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3489" }, { "cve": "CVE-2021-3490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3490" } ], "notes": [ { "category": "general", "text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3490", "url": "https://www.suse.com/security/cve/CVE-2021-3490" }, { "category": "external", "summary": "SUSE Bug 1185641 for CVE-2021-3490", "url": "https://bugzilla.suse.com/1185641" }, { "category": "external", "summary": "SUSE Bug 1185796 for CVE-2021-3490", "url": "https://bugzilla.suse.com/1185796" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3490" }, { "cve": "CVE-2021-3491", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3491" } ], "notes": [ { "category": "general", "text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3491", "url": "https://www.suse.com/security/cve/CVE-2021-3491" }, { "category": "external", "summary": "SUSE Bug 1185642 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1185642" }, { "category": "external", "summary": "SUSE Bug 1187090 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1187090" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3491" }, { "cve": "CVE-2021-3542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3542" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42739. Reason: This candidate is a reservation duplicate of CVE-2021-42739. Notes: All CVE users should reference CVE-2021-42739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3542", "url": "https://www.suse.com/security/cve/CVE-2021-3542" }, { "category": "external", "summary": "SUSE Bug 1184673 for CVE-2021-3542", "url": "https://bugzilla.suse.com/1184673" }, { "category": "external", "summary": "SUSE Bug 1186063 for CVE-2021-3542", "url": "https://bugzilla.suse.com/1186063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3542" }, { "cve": "CVE-2021-3640", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3640" } ], "notes": [ { "category": "general", "text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3640", "url": "https://www.suse.com/security/cve/CVE-2021-3640" }, { "category": "external", "summary": "SUSE Bug 1188172 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1188172" }, { "category": "external", "summary": "SUSE Bug 1188613 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1188613" }, { "category": "external", "summary": "SUSE Bug 1191530 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1191530" }, { "category": "external", "summary": "SUSE Bug 1196810 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1196810" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3640" }, { "cve": "CVE-2021-3653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3653" } ], "notes": [ { "category": "general", "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3653", "url": "https://www.suse.com/security/cve/CVE-2021-3653" }, { "category": "external", "summary": "SUSE Bug 1189399 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1189399" }, { "category": "external", "summary": "SUSE Bug 1189420 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1189420" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3653" }, { "cve": "CVE-2021-3656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3656", "url": "https://www.suse.com/security/cve/CVE-2021-3656" }, { "category": "external", "summary": "SUSE Bug 1189400 for CVE-2021-3656", "url": "https://bugzilla.suse.com/1189400" }, { "category": "external", "summary": "SUSE Bug 1189418 for CVE-2021-3656", "url": "https://bugzilla.suse.com/1189418" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3656" }, { "cve": "CVE-2021-3744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3744" } ], "notes": [ { "category": "general", "text": "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3744", "url": "https://www.suse.com/security/cve/CVE-2021-3744" }, { "category": "external", "summary": "SUSE Bug 1189884 for CVE-2021-3744", "url": "https://bugzilla.suse.com/1189884" }, { "category": "external", "summary": "SUSE Bug 1190534 for CVE-2021-3744", "url": "https://bugzilla.suse.com/1190534" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3744" }, { "cve": "CVE-2021-3753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3753" } ], "notes": [ { "category": "general", "text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3753", "url": "https://www.suse.com/security/cve/CVE-2021-3753" }, { "category": "external", "summary": "SUSE Bug 1190025 for CVE-2021-3753", "url": "https://bugzilla.suse.com/1190025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3753" }, { "cve": "CVE-2021-37576", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-37576" } ], "notes": [ { "category": "general", "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-37576", "url": "https://www.suse.com/security/cve/CVE-2021-37576" }, { "category": "external", "summary": "SUSE Bug 1188838 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1188838" }, { "category": "external", "summary": "SUSE Bug 1188842 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1188842" }, { "category": "external", "summary": "SUSE Bug 1190276 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1190276" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-37576" }, { "cve": "CVE-2021-3759", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3759" } ], "notes": [ { "category": "general", "text": "A memory overflow vulnerability was found in the Linux kernel\u0027s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3759", "url": "https://www.suse.com/security/cve/CVE-2021-3759" }, { "category": "external", "summary": "SUSE Bug 1190115 for CVE-2021-3759", "url": "https://bugzilla.suse.com/1190115" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3759" }, { "cve": "CVE-2021-38166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-38166" } ], "notes": [ { "category": "general", "text": "In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-38166", "url": "https://www.suse.com/security/cve/CVE-2021-38166" }, { "category": "external", "summary": "SUSE Bug 1189233 for CVE-2021-38166", "url": "https://bugzilla.suse.com/1189233" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-38166" }, { "cve": "CVE-2021-43976", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43976" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.15.2, mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43976", "url": "https://www.suse.com/security/cve/CVE-2021-43976" }, { "category": "external", "summary": "SUSE Bug 1192847 for CVE-2021-43976", "url": "https://bugzilla.suse.com/1192847" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-43976" }, { "cve": "CVE-2022-0185", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0185" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0185", "url": "https://www.suse.com/security/cve/CVE-2022-0185" }, { "category": "external", "summary": "SUSE Bug 1194517 for CVE-2022-0185", "url": "https://bugzilla.suse.com/1194517" }, { "category": "external", "summary": "SUSE Bug 1194737 for CVE-2022-0185", "url": "https://bugzilla.suse.com/1194737" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-0185" }, { "cve": "CVE-2022-0330", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0330" } ], "notes": [ { "category": "general", "text": "A random memory access flaw was found in the Linux kernel\u0027s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0330", "url": "https://www.suse.com/security/cve/CVE-2022-0330" }, { "category": "external", "summary": "SUSE Bug 1194880 for CVE-2022-0330", "url": "https://bugzilla.suse.com/1194880" }, { "category": "external", "summary": "SUSE Bug 1195950 for CVE-2022-0330", "url": "https://bugzilla.suse.com/1195950" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-0330" }, { "cve": "CVE-2022-0847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0847" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0847", "url": "https://www.suse.com/security/cve/CVE-2022-0847" }, { "category": "external", "summary": "SUSE Bug 1196584 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196584" }, { "category": "external", "summary": "SUSE Bug 1196601 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-0847" }, { "cve": "CVE-2022-0886", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0886" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-27666. Reason: This candidate is a reservation duplicate of CVE-2022-27666. Notes: All CVE users should reference CVE-2022-27666 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0886", "url": "https://www.suse.com/security/cve/CVE-2022-0886" }, { "category": "external", "summary": "SUSE Bug 1197131 for CVE-2022-0886", "url": "https://bugzilla.suse.com/1197131" }, { "category": "external", "summary": "SUSE Bug 1197133 for CVE-2022-0886", "url": "https://bugzilla.suse.com/1197133" }, { "category": "external", "summary": "SUSE Bug 1197462 for CVE-2022-0886", "url": "https://bugzilla.suse.com/1197462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-0886" }, { "cve": "CVE-2022-1462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1462" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read flaw was found in the Linux kernel\u0027s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1462", "url": "https://www.suse.com/security/cve/CVE-2022-1462" }, { "category": "external", "summary": "SUSE Bug 1198829 for CVE-2022-1462", "url": "https://bugzilla.suse.com/1198829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1516" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1516", "url": "https://www.suse.com/security/cve/CVE-2022-1516" }, { "category": "external", "summary": "SUSE Bug 1199012 for CVE-2022-1516", "url": "https://bugzilla.suse.com/1199012" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-1516" }, { "cve": "CVE-2022-1679", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1679" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1679", "url": "https://www.suse.com/security/cve/CVE-2022-1679" }, { "category": "external", "summary": "SUSE Bug 1199487 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1199487" }, { "category": "external", "summary": "SUSE Bug 1201080 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201080" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201832" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212316 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1212316" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1729", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1729" } ], "notes": [ { "category": "general", "text": "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1729", "url": "https://www.suse.com/security/cve/CVE-2022-1729" }, { "category": "external", "summary": "SUSE Bug 1199507 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1199507" }, { "category": "external", "summary": "SUSE Bug 1199697 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1199697" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1201832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1852", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1852" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1852", "url": "https://www.suse.com/security/cve/CVE-2022-1852" }, { "category": "external", "summary": "SUSE Bug 1199875 for CVE-2022-1852", "url": "https://bugzilla.suse.com/1199875" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-1852" }, { "cve": "CVE-2022-1966", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1966" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1966", "url": "https://www.suse.com/security/cve/CVE-2022-1966" }, { "category": "external", "summary": "SUSE Bug 1200015 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200015" }, { "category": "external", "summary": "SUSE Bug 1200268 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200268" }, { "category": "external", "summary": "SUSE Bug 1200494 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200494" }, { "category": "external", "summary": "SUSE Bug 1200529 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200529" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-1966" }, { "cve": "CVE-2022-1972", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1972" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2078. Reason: This candidate is a reservation duplicate of CVE-2022-2078. Notes: All CVE users should reference CVE-2022-2078 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1972", "url": "https://www.suse.com/security/cve/CVE-2022-1972" }, { "category": "external", "summary": "SUSE Bug 1200019 for CVE-2022-1972", "url": "https://bugzilla.suse.com/1200019" }, { "category": "external", "summary": "SUSE Bug 1200266 for CVE-2022-1972", "url": "https://bugzilla.suse.com/1200266" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-1972" }, { "cve": "CVE-2022-1973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1973" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel in log_replay in fs/ntfs3/fslog.c in the NTFS journal. This flaw allows a local attacker to crash the system and leads to a kernel information leak problem.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1973", "url": "https://www.suse.com/security/cve/CVE-2022-1973" }, { "category": "external", "summary": "SUSE Bug 1200023 for CVE-2022-1973", "url": "https://bugzilla.suse.com/1200023" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-1973" }, { "cve": "CVE-2022-22942", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-22942" } ], "notes": [ { "category": "general", "text": "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling \u0027file\u0027 pointer.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-22942", "url": "https://www.suse.com/security/cve/CVE-2022-22942" }, { "category": "external", "summary": "SUSE Bug 1195065 for CVE-2022-22942", "url": "https://bugzilla.suse.com/1195065" }, { "category": "external", "summary": "SUSE Bug 1195951 for CVE-2022-22942", "url": "https://bugzilla.suse.com/1195951" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-22942" }, { "cve": "CVE-2022-2308", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-2308" } ], "notes": [ { "category": "general", "text": "A flaw was found in vDPA with VDUSE backend. There are currently no checks in VDUSE kernel driver to ensure the size of the device config space is in line with the features advertised by the VDUSE userspace application. In case of a mismatch, Virtio drivers config read helpers do not initialize the memory indirectly passed to vduse_vdpa_get_config() returning uninitialized memory from the stack. This could cause undefined behavior or data leaks in Virtio drivers.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-2308", "url": "https://www.suse.com/security/cve/CVE-2022-2308" }, { "category": "external", "summary": "SUSE Bug 1202573 for CVE-2022-2308", "url": "https://bugzilla.suse.com/1202573" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-2308" }, { "cve": "CVE-2022-24958", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24958" } ], "notes": [ { "category": "general", "text": "drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev-\u003ebuf release.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24958", "url": "https://www.suse.com/security/cve/CVE-2022-24958" }, { "category": "external", "summary": "SUSE Bug 1195905 for CVE-2022-24958", "url": "https://bugzilla.suse.com/1195905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-24958" }, { "cve": "CVE-2022-2588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-2588" } ], "notes": [ { "category": "general", "text": "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-2588", "url": "https://www.suse.com/security/cve/CVE-2022-2588" }, { "category": "external", "summary": "SUSE Bug 1202096 for CVE-2022-2588", "url": "https://bugzilla.suse.com/1202096" }, { "category": "external", "summary": "SUSE Bug 1203613 for CVE-2022-2588", "url": "https://bugzilla.suse.com/1203613" }, { "category": "external", "summary": "SUSE Bug 1204183 for CVE-2022-2588", "url": "https://bugzilla.suse.com/1204183" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-2588", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2590", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-2590" } ], "notes": [ { "category": "general", "text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only shared memory mappings. This flaw allows an unprivileged, local user to gain write access to read-only memory mappings, increasing their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-2590", "url": "https://www.suse.com/security/cve/CVE-2022-2590" }, { "category": "external", "summary": "SUSE Bug 1202013 for CVE-2022-2590", "url": "https://bugzilla.suse.com/1202013" }, { "category": "external", "summary": "SUSE Bug 1202089 for CVE-2022-2590", "url": "https://bugzilla.suse.com/1202089" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-2590" }, { "cve": "CVE-2022-26490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26490" } ], "notes": [ { "category": "general", "text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26490", "url": "https://www.suse.com/security/cve/CVE-2022-26490" }, { "category": "external", "summary": "SUSE Bug 1196830 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1196830" }, { "category": "external", "summary": "SUSE Bug 1201656 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201656" }, { "category": "external", "summary": "SUSE Bug 1201969 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201969" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-26490" }, { "cve": "CVE-2022-28388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28388" } ], "notes": [ { "category": "general", "text": "usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28388", "url": "https://www.suse.com/security/cve/CVE-2022-28388" }, { "category": "external", "summary": "SUSE Bug 1198032 for CVE-2022-28388", "url": "https://bugzilla.suse.com/1198032" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-28388" }, { "cve": "CVE-2022-28389", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28389" } ], "notes": [ { "category": "general", "text": "mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28389", "url": "https://www.suse.com/security/cve/CVE-2022-28389" }, { "category": "external", "summary": "SUSE Bug 1198033 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1198033" }, { "category": "external", "summary": "SUSE Bug 1201657 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1201657" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-28389" }, { "cve": "CVE-2022-28390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28390" } ], "notes": [ { "category": "general", "text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28390", "url": "https://www.suse.com/security/cve/CVE-2022-28390" }, { "category": "external", "summary": "SUSE Bug 1198031 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1198031" }, { "category": "external", "summary": "SUSE Bug 1201517 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1201517" }, { "category": "external", "summary": "SUSE Bug 1207969 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1207969" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-28390" }, { "cve": "CVE-2022-28893", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28893" } ], "notes": [ { "category": "general", "text": "The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28893", "url": "https://www.suse.com/security/cve/CVE-2022-28893" }, { "category": "external", "summary": "SUSE Bug 1198330 for CVE-2022-28893", "url": "https://bugzilla.suse.com/1198330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-28893" }, { "cve": "CVE-2022-29900", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29900" } ], "notes": [ { "category": "general", "text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29900", "url": "https://www.suse.com/security/cve/CVE-2022-29900" }, { "category": "external", "summary": "SUSE Bug 1199657 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1199657" }, { "category": "external", "summary": "SUSE Bug 1201469 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1201469" }, { "category": "external", "summary": "SUSE Bug 1207894 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1207894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29901" } ], "notes": [ { "category": "general", "text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29901", "url": "https://www.suse.com/security/cve/CVE-2022-29901" }, { "category": "external", "summary": "SUSE Bug 1199657 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1199657" }, { "category": "external", "summary": "SUSE Bug 1201469 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1201469" }, { "category": "external", "summary": "SUSE Bug 1207894 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1207894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-29901" }, { "cve": "CVE-2022-29968", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29968" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb-\u003eprivate.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29968", "url": "https://www.suse.com/security/cve/CVE-2022-29968" }, { "category": "external", "summary": "SUSE Bug 1199087 for CVE-2022-29968", "url": "https://bugzilla.suse.com/1199087" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2022-29968" }, { "cve": "CVE-2022-3424", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3424" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3424", "url": "https://www.suse.com/security/cve/CVE-2022-3424" }, { "category": "external", "summary": "SUSE Bug 1204166 for CVE-2022-3424", "url": "https://bugzilla.suse.com/1204166" }, { "category": "external", "summary": "SUSE Bug 1204167 for CVE-2022-3424", "url": "https://bugzilla.suse.com/1204167" }, { "category": "external", "summary": "SUSE Bug 1208044 for CVE-2022-3424", "url": "https://bugzilla.suse.com/1208044" }, { "category": "external", "summary": "SUSE Bug 1212309 for CVE-2022-3424", "url": "https://bugzilla.suse.com/1212309" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34918" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34918", "url": "https://www.suse.com/security/cve/CVE-2022-34918" }, { "category": "external", "summary": "SUSE Bug 1201171 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201171" }, { "category": "external", "summary": "SUSE Bug 1201177 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201177" }, { "category": "external", "summary": "SUSE Bug 1201222 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201222" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-34918" }, { "cve": "CVE-2022-3628", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3628" } ], "notes": [ { "category": "general", "text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3628", "url": "https://www.suse.com/security/cve/CVE-2022-3628" }, { "category": "external", "summary": "SUSE Bug 1204868 for CVE-2022-3628", "url": "https://bugzilla.suse.com/1204868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-3628" }, { "cve": "CVE-2022-3640", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3640" } ], "notes": [ { "category": "general", "text": "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3640", "url": "https://www.suse.com/security/cve/CVE-2022-3640" }, { "category": "external", "summary": "SUSE Bug 1204619 for CVE-2022-3640", "url": "https://bugzilla.suse.com/1204619" }, { "category": "external", "summary": "SUSE Bug 1204624 for CVE-2022-3640", "url": "https://bugzilla.suse.com/1204624" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-3640", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-3640" }, { "cve": "CVE-2022-40982", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-40982" } ], "notes": [ { "category": "general", "text": "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-40982", "url": "https://www.suse.com/security/cve/CVE-2022-40982" }, { "category": "external", "summary": "SUSE Bug 1206418 for CVE-2022-40982", "url": "https://bugzilla.suse.com/1206418" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2022-40982", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-40982" }, { "cve": "CVE-2022-41218", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-41218" } ], "notes": [ { "category": "general", "text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-41218", "url": "https://www.suse.com/security/cve/CVE-2022-41218" }, { "category": "external", "summary": "SUSE Bug 1202960 for CVE-2022-41218", "url": "https://bugzilla.suse.com/1202960" }, { "category": "external", "summary": "SUSE Bug 1203606 for CVE-2022-41218", "url": "https://bugzilla.suse.com/1203606" }, { "category": "external", "summary": "SUSE Bug 1205313 for CVE-2022-41218", "url": "https://bugzilla.suse.com/1205313" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-41218", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-41218" }, { "cve": "CVE-2022-41674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-41674" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-41674", "url": "https://www.suse.com/security/cve/CVE-2022-41674" }, { "category": "external", "summary": "SUSE Bug 1203770 for CVE-2022-41674", "url": "https://bugzilla.suse.com/1203770" }, { "category": "external", "summary": "SUSE Bug 1203994 for CVE-2022-41674", "url": "https://bugzilla.suse.com/1203994" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-41674", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-41674" }, { "cve": "CVE-2022-42719", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-42719" } ], "notes": [ { "category": "general", "text": "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-42719", "url": "https://www.suse.com/security/cve/CVE-2022-42719" }, { "category": "external", "summary": "SUSE Bug 1204051 for CVE-2022-42719", "url": "https://bugzilla.suse.com/1204051" }, { "category": "external", "summary": "SUSE Bug 1204292 for CVE-2022-42719", "url": "https://bugzilla.suse.com/1204292" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-42719", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-42719" }, { "cve": "CVE-2022-42720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-42720" } ], "notes": [ { "category": "general", "text": "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-42720", "url": "https://www.suse.com/security/cve/CVE-2022-42720" }, { "category": "external", "summary": "SUSE Bug 1204059 for CVE-2022-42720", "url": "https://bugzilla.suse.com/1204059" }, { "category": "external", "summary": "SUSE Bug 1204291 for CVE-2022-42720", "url": "https://bugzilla.suse.com/1204291" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-42720", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-42720" }, { "cve": "CVE-2022-42721", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-42721" } ], "notes": [ { "category": "general", "text": "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-42721", "url": "https://www.suse.com/security/cve/CVE-2022-42721" }, { "category": "external", "summary": "SUSE Bug 1204060 for CVE-2022-42721", "url": "https://bugzilla.suse.com/1204060" }, { "category": "external", "summary": "SUSE Bug 1204290 for CVE-2022-42721", "url": "https://bugzilla.suse.com/1204290" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-42721", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-42721" }, { "cve": "CVE-2022-42722", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-42722" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-42722", "url": "https://www.suse.com/security/cve/CVE-2022-42722" }, { "category": "external", "summary": "SUSE Bug 1204125 for CVE-2022-42722", "url": "https://bugzilla.suse.com/1204125" }, { "category": "external", "summary": "SUSE Bug 1204289 for CVE-2022-42722", "url": "https://bugzilla.suse.com/1204289" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-42722", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-42722" }, { "cve": "CVE-2022-4379", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-4379" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-4379", "url": "https://www.suse.com/security/cve/CVE-2022-4379" }, { "category": "external", "summary": "SUSE Bug 1206209 for CVE-2022-4379", "url": "https://bugzilla.suse.com/1206209" }, { "category": "external", "summary": "SUSE Bug 1206373 for CVE-2022-4379", "url": "https://bugzilla.suse.com/1206373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-4379" }, { "cve": "CVE-2022-44032", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-44032" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4000_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cmm_open() and cm4000_detach().", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-44032", "url": "https://www.suse.com/security/cve/CVE-2022-44032" }, { "category": "external", "summary": "SUSE Bug 1204894 for CVE-2022-44032", "url": "https://bugzilla.suse.com/1204894" }, { "category": "external", "summary": "SUSE Bug 1212290 for CVE-2022-44032", "url": "https://bugzilla.suse.com/1212290" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-44032" }, { "cve": "CVE-2022-44033", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-44033" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4040_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cm4040_open() and reader_detach().", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-44033", "url": "https://www.suse.com/security/cve/CVE-2022-44033" }, { "category": "external", "summary": "SUSE Bug 1204922 for CVE-2022-44033", "url": "https://bugzilla.suse.com/1204922" }, { "category": "external", "summary": "SUSE Bug 1212306 for CVE-2022-44033", "url": "https://bugzilla.suse.com/1212306" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-44033" }, { "cve": "CVE-2022-44034", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-44034" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/scr24x_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between scr24x_open() and scr24x_remove().", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-44034", "url": "https://www.suse.com/security/cve/CVE-2022-44034" }, { "category": "external", "summary": "SUSE Bug 1204901 for CVE-2022-44034", "url": "https://bugzilla.suse.com/1204901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-44034" }, { "cve": "CVE-2022-45884", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45884" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free, related to dvb_register_device dynamically allocating fops.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45884", "url": "https://www.suse.com/security/cve/CVE-2022-45884" }, { "category": "external", "summary": "SUSE Bug 1205756 for CVE-2022-45884", "url": "https://bugzilla.suse.com/1205756" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45885" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_frontend.c has a race condition that can cause a use-after-free when a device is disconnected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45885", "url": "https://www.suse.com/security/cve/CVE-2022-45885" }, { "category": "external", "summary": "SUSE Bug 1205758 for CVE-2022-45885", "url": "https://bugzilla.suse.com/1205758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45886" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45886", "url": "https://www.suse.com/security/cve/CVE-2022-45886" }, { "category": "external", "summary": "SUSE Bug 1205760 for CVE-2022-45886", "url": "https://bugzilla.suse.com/1205760" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45887" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45887", "url": "https://www.suse.com/security/cve/CVE-2022-45887" }, { "category": "external", "summary": "SUSE Bug 1205762 for CVE-2022-45887", "url": "https://bugzilla.suse.com/1205762" }, { "category": "external", "summary": "SUSE Bug 1220015 for CVE-2022-45887", "url": "https://bugzilla.suse.com/1220015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45888" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45888", "url": "https://www.suse.com/security/cve/CVE-2022-45888" }, { "category": "external", "summary": "SUSE Bug 1205764 for CVE-2022-45888", "url": "https://bugzilla.suse.com/1205764" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45888" }, { "cve": "CVE-2022-45919", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45919" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45919", "url": "https://www.suse.com/security/cve/CVE-2022-45919" }, { "category": "external", "summary": "SUSE Bug 1205803 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1205803" }, { "category": "external", "summary": "SUSE Bug 1208600 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1208600" }, { "category": "external", "summary": "SUSE Bug 1208912 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1208912" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45934" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45934", "url": "https://www.suse.com/security/cve/CVE-2022-45934" }, { "category": "external", "summary": "SUSE Bug 1205796 for CVE-2022-45934", "url": "https://bugzilla.suse.com/1205796" }, { "category": "external", "summary": "SUSE Bug 1212292 for CVE-2022-45934", "url": "https://bugzilla.suse.com/1212292" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45934" }, { "cve": "CVE-2023-0045", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-0045" } ], "notes": [ { "category": "general", "text": "The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176.\n\nWe recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-0045", "url": "https://www.suse.com/security/cve/CVE-2023-0045" }, { "category": "external", "summary": "SUSE Bug 1207773 for CVE-2023-0045", "url": "https://bugzilla.suse.com/1207773" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-0045" }, { "cve": "CVE-2023-1076", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1076" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1076", "url": "https://www.suse.com/security/cve/CVE-2023-1076" }, { "category": "external", "summary": "SUSE Bug 1208599 for CVE-2023-1076", "url": "https://bugzilla.suse.com/1208599" }, { "category": "external", "summary": "SUSE Bug 1214019 for CVE-2023-1076", "url": "https://bugzilla.suse.com/1214019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1078", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1078" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1078", "url": "https://www.suse.com/security/cve/CVE-2023-1078" }, { "category": "external", "summary": "SUSE Bug 1208601 for CVE-2023-1078", "url": "https://bugzilla.suse.com/1208601" }, { "category": "external", "summary": "SUSE Bug 1208603 for CVE-2023-1078", "url": "https://bugzilla.suse.com/1208603" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-1078" }, { "cve": "CVE-2023-1192", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1192" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1192", "url": "https://www.suse.com/security/cve/CVE-2023-1192" }, { "category": "external", "summary": "SUSE Bug 1208995 for CVE-2023-1192", "url": "https://bugzilla.suse.com/1208995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-1192" }, { "cve": "CVE-2023-1380", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1380" } ], "notes": [ { "category": "general", "text": "A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info-\u003ereq_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1380", "url": "https://www.suse.com/security/cve/CVE-2023-1380" }, { "category": "external", "summary": "SUSE Bug 1209287 for CVE-2023-1380", "url": "https://bugzilla.suse.com/1209287" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-1380" }, { "cve": "CVE-2023-20569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-20569" } ], "notes": [ { "category": "general", "text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-20569", "url": "https://www.suse.com/security/cve/CVE-2023-20569" }, { "category": "external", "summary": "SUSE Bug 1213287 for CVE-2023-20569", "url": "https://bugzilla.suse.com/1213287" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-20569" }, { "cve": "CVE-2023-20593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-20593" } ], "notes": [ { "category": "general", "text": "An issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-20593", "url": "https://www.suse.com/security/cve/CVE-2023-20593" }, { "category": "external", "summary": "SUSE Bug 1213286 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1213286" }, { "category": "external", "summary": "SUSE Bug 1213616 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1213616" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-20593" }, { "cve": "CVE-2023-2124", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-2124" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory access flaw was found in the Linux kernel\u0027s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-2124", "url": "https://www.suse.com/security/cve/CVE-2023-2124" }, { "category": "external", "summary": "SUSE Bug 1210498 for CVE-2023-2124", "url": "https://bugzilla.suse.com/1210498" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-2124" }, { "cve": "CVE-2023-31084", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31084" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNING. In dvb_frontend_get_event, wait_event_interruptible is called; the condition is dvb_frontend_test_event(fepriv,events). In dvb_frontend_test_event, down(\u0026fepriv-\u003esem) is called. However, wait_event_interruptible would put the process to sleep, and down(\u0026fepriv-\u003esem) may block the process.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31084", "url": "https://www.suse.com/security/cve/CVE-2023-31084" }, { "category": "external", "summary": "SUSE Bug 1210783 for CVE-2023-31084", "url": "https://bugzilla.suse.com/1210783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3141" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3141", "url": "https://www.suse.com/security/cve/CVE-2023-3141" }, { "category": "external", "summary": "SUSE Bug 1212129 for CVE-2023-3141", "url": "https://bugzilla.suse.com/1212129" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-3141", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-3141" }, { "cve": "CVE-2023-3269", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3269" } ], "notes": [ { "category": "general", "text": "A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3269", "url": "https://www.suse.com/security/cve/CVE-2023-3269" }, { "category": "external", "summary": "SUSE Bug 1212395 for CVE-2023-3269", "url": "https://bugzilla.suse.com/1212395" }, { "category": "external", "summary": "SUSE Bug 1213760 for CVE-2023-3269", "url": "https://bugzilla.suse.com/1213760" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-3269" }, { "cve": "CVE-2023-39192", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-39192" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-39192", "url": "https://www.suse.com/security/cve/CVE-2023-39192" }, { "category": "external", "summary": "SUSE Bug 1215858 for CVE-2023-39192", "url": "https://bugzilla.suse.com/1215858" }, { "category": "external", "summary": "SUSE Bug 1220015 for CVE-2023-39192", "url": "https://bugzilla.suse.com/1220015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-39192" }, { "cve": "CVE-2023-39193", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-39193" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-39193", "url": "https://www.suse.com/security/cve/CVE-2023-39193" }, { "category": "external", "summary": "SUSE Bug 1215860 for CVE-2023-39193", "url": "https://bugzilla.suse.com/1215860" }, { "category": "external", "summary": "SUSE Bug 1220015 for CVE-2023-39193", "url": "https://bugzilla.suse.com/1220015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-39193" }, { "cve": "CVE-2023-4128", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4128" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Reason: This record is a duplicate of CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Notes: All CVE users should reference CVE-2023-4206, CVE-2023-4207, CVE-2023-4208 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4128", "url": "https://www.suse.com/security/cve/CVE-2023-4128" }, { "category": "external", "summary": "SUSE Bug 1214149 for CVE-2023-4128", "url": "https://bugzilla.suse.com/1214149" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-4128" }, { "cve": "CVE-2023-4134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4134" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4134", "url": "https://www.suse.com/security/cve/CVE-2023-4134" }, { "category": "external", "summary": "SUSE Bug 1213971 for CVE-2023-4134", "url": "https://bugzilla.suse.com/1213971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-4134" }, { "cve": "CVE-2023-4194", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4194" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 (\"tun: tun_chr_open(): correctly initialize socket uid\"), - 66b2c338adce (\"tap: tap_open(): correctly initialize socket uid\"), pass \"inode-\u003ei_uid\" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4194", "url": "https://www.suse.com/security/cve/CVE-2023-4194" }, { "category": "external", "summary": "SUSE Bug 1214019 for CVE-2023-4194", "url": "https://bugzilla.suse.com/1214019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-4194" }, { "cve": "CVE-2023-42753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42753" } ], "notes": [ { "category": "general", "text": "An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h-\u003enets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42753", "url": "https://www.suse.com/security/cve/CVE-2023-42753" }, { "category": "external", "summary": "SUSE Bug 1215150 for CVE-2023-42753", "url": "https://bugzilla.suse.com/1215150" }, { "category": "external", "summary": "SUSE Bug 1218613 for CVE-2023-42753", "url": "https://bugzilla.suse.com/1218613" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-42753" }, { "cve": "CVE-2023-42754", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42754" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42754", "url": "https://www.suse.com/security/cve/CVE-2023-42754" }, { "category": "external", "summary": "SUSE Bug 1215467 for CVE-2023-42754", "url": "https://bugzilla.suse.com/1215467" }, { "category": "external", "summary": "SUSE Bug 1222212 for CVE-2023-42754", "url": "https://bugzilla.suse.com/1222212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-42754" }, { "cve": "CVE-2023-42756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42756" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42756", "url": "https://www.suse.com/security/cve/CVE-2023-42756" }, { "category": "external", "summary": "SUSE Bug 1215767 for CVE-2023-42756", "url": "https://bugzilla.suse.com/1215767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-42756" }, { "cve": "CVE-2023-4623", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4623" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4623", "url": "https://www.suse.com/security/cve/CVE-2023-4623" }, { "category": "external", "summary": "SUSE Bug 1215115 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1215115" }, { "category": "external", "summary": "SUSE Bug 1215440 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1215440" }, { "category": "external", "summary": "SUSE Bug 1217444 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1217444" }, { "category": "external", "summary": "SUSE Bug 1217531 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1217531" }, { "category": "external", "summary": "SUSE Bug 1219698 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1219698" }, { "category": "external", "summary": "SUSE Bug 1221578 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1221578" }, { "category": "external", "summary": "SUSE Bug 1221598 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1221598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-4623" }, { "cve": "CVE-2023-46813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-46813" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-46813", "url": "https://www.suse.com/security/cve/CVE-2023-46813" }, { "category": "external", "summary": "SUSE Bug 1212649 for CVE-2023-46813", "url": "https://bugzilla.suse.com/1212649" }, { "category": "external", "summary": "SUSE Bug 1216896 for CVE-2023-46813", "url": "https://bugzilla.suse.com/1216896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-46813" }, { "cve": "CVE-2023-4881", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4881" } ], "notes": [ { "category": "general", "text": "CVE-2023-4881 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4881", "url": "https://www.suse.com/security/cve/CVE-2023-4881" }, { "category": "external", "summary": "SUSE Bug 1215221 for CVE-2023-4881", "url": "https://bugzilla.suse.com/1215221" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-4881" }, { "cve": "CVE-2023-5345", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-5345" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s fs/smb/client component can be exploited to achieve local privilege escalation.\n\nIn case of an error in smb3_fs_context_parse_param, ctx-\u003epassword was freed but the field was not set to NULL which could lead to double free.\n\nWe recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-5345", "url": "https://www.suse.com/security/cve/CVE-2023-5345" }, { "category": "external", "summary": "SUSE Bug 1215899 for CVE-2023-5345", "url": "https://bugzilla.suse.com/1215899" }, { "category": "external", "summary": "SUSE Bug 1215971 for CVE-2023-5345", "url": "https://bugzilla.suse.com/1215971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-5345" }, { "cve": "CVE-2023-6606", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6606" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6606", "url": "https://www.suse.com/security/cve/CVE-2023-6606" }, { "category": "external", "summary": "SUSE Bug 1217947 for CVE-2023-6606", "url": "https://bugzilla.suse.com/1217947" }, { "category": "external", "summary": "SUSE Bug 1220015 for CVE-2023-6606", "url": "https://bugzilla.suse.com/1220015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-6606" }, { "cve": "CVE-2023-6610", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6610" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6610", "url": "https://www.suse.com/security/cve/CVE-2023-6610" }, { "category": "external", "summary": "SUSE Bug 1217946 for CVE-2023-6610", "url": "https://bugzilla.suse.com/1217946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-6610" } ] }
opensuse-su-2020:1236-1
Vulnerability from csaf_opensuse
Published
2020-08-20 22:20
Modified
2020-08-20 22:20
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.
This update is signed with the new UEFI signing key for openSUSE. It contains rebuilds of all available KMP packages also rebuilt
with the new UEFi signing key. (boo#1174543)
The following security bugs were fixed:
- CVE-2020-14356: A use after free vulnerability in cgroup BPF component was fixed (bsc#1175213).
- CVE-2020-14331: A buffer over write in vgacon_scroll was fixed (bnc#1174205).
- CVE-2020-16166: The Linux kernel allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c (bnc#1174757).
- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).
- CVE-2020-10781: zram sysfs resource consumption was fixed (bnc#1173074).
The following non-security bugs were fixed:
- 9p/trans_fd: Fix concurrency del of req_list in p9_fd_cancelled/p9_read_work (git-fixes).
- ACPICA: Dispatcher: add status checks (git-fixes).
- ACPI/IORT: Fix PMCG node single ID mapping handling (git-fixes).
- ACPI: video: Use native backlight on Acer Aspire 5783z (git-fixes).
- ACPI: video: Use native backlight on Acer TravelMate 5735Z (git-fixes).
- af_key: pfkey_dump needs parameter validation (git-fixes).
- agp/intel: Fix a memory leak on module initialisation failure (git-fixes).
- ALSA: asihpi: delete duplicated word (git-fixes).
- ALSA: atmel: Remove invalid 'fall through' comments (git-fixes).
- ALSA: core: pcm_iec958: fix kernel-doc (git-fixes).
- ALSA: echoaduio: Drop superfluous volatile modifier (git-fixes).
- ALSA: echoaudio: Address bugs in the interrupt handling (git-fixes).
- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (git-fixes).
- ALSA: echoaudio: Prevent races in calls to set_audio_format() (git-fixes).
- ALSA: echoaudio: Prevent some noise on unloading the module (git-fixes).
- ALSA: echoaudio: Race conditions around 'opencount' (git-fixes).
- ALSA: echoaudio: re-enable IRQs on failure path (git-fixes).
- ALSA: echoaudio: Remove redundant check (git-fixes).
- ALSA: firewire: fix kernel-doc (git-fixes).
- ALSA: hda: Add support for Loongson 7A1000 controller (git-fixes).
- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (git-fixes).
- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (git-fixes).
- ALSA: hda: Enable sync-write operation as default for all controllers (git-fixes).
- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).
- ALSA: hda: fix snd_hda_codec_cleanup() documentation (git-fixes).
- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (git-fixes).
- ALSA: hda/hdmi: Add quirk to force connectivity (git-fixes).
- ALSA: hda/hdmi: Fix keep_power assignment for non-component devices (git-fixes).
- ALSA: hda/hdmi: Use force connectivity quirk on another HP desktop (git-fixes).
- ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H and EKL (jsc#SLE-13261).
- ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H and EKL (jsc#SLE-13261).
- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (git-fixes).
- ALSA: hda/realtek - change to suitable link model for ASUS platform (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (git-fixes).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (git-fixes).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (git-fixes).
- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (git-fixes).
- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (git-fixes).
- ALSA: hda/realtek: Fix add a 'ultra_low_power' function for intel reference board (alc256) (git-fixes).
- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (git-fixes).
- ALSA: hda/realtek - Fixed HP right speaker no sound (git-fixes).
- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (git-fixes).
- ALSA: hda/realtek - Fix unused variable warning (git-fixes).
- ALSA: hda/realtek - fixup for yet another Intel reference board (git-fixes).
- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (git-fixes).
- ALSA: hda - reverse the setting value in the micmute_led_set (git-fixes).
- ALSA: hda/tegra: Disable sync-write operation (git-fixes).
- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).
- ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).
- ALSA: isa: delete repeated words in comments (git-fixes).
- ALSA: isa/gus: remove 'set but not used' warning (git-fixes).
- ALSA: isa/gus: remove -Wmissing-prototypes warnings (git-fixes).
- ALSA: line6: add hw monitor volume control for POD HD500 (git-fixes).
- ALSA: line6: Perform sanity check for each URB creation (git-fixes).
- ALSA: line6: Sync the pending work cancel at disconnection (git-fixes).
- ALSA: line6: Use kmemdup in podhd_set_monitor_level() (git-fixes).
- ALSA: pci/asihpi: fix kernel-doc (git-fixes).
- ALSA: pci/asihpi: remove 'set but not used' warning (git-fixes).
- ALSA: pci/asihpi: remove 'set but not used' warnings (git-fixes).
- ALSA: pci/au88x0: remove 'defined but not used' warnings (git-fixes).
- ALSA: pci/aw2-saa7146: remove 'set but not used' warning (git-fixes).
- ALSA: pci/ctxfi/ctatc: fix kernel-doc (git-fixes).
- ALSA: pci/ctxfi: fix kernel-doc warnings (git-fixes).
- ALSA: pci: delete repeated words in comments (git-fixes).
- ALSA: pci/echoaudio: remove 'set but not used' warning (git-fixes).
- ALSA: pci/emu10k1: remove 'set but not used' warning (git-fixes).
- ALSA: pci/es1938: remove 'set but not used' warning (git-fixes).
- ALSA: pci/fm801: fix kernel-doc (git-fixes).
- ALSA: pci/korg1212: remove 'set but not used' warnings (git-fixes).
- ALSA: pci/oxygen/xonar_wm87x6: remove always true condition (git-fixes).
- ALSA: pci/rme9652/hdspm: remove always true condition (git-fixes).
- ALSA: pci/via82xx: remove 'set but not used' warnings (git-fixes).
- ALSA: pcmcia/pdaudiocf: fix kernel-doc (git-fixes).
- ALSA: seq: oss: Serialize ioctls (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for SSL2 (git-fixes).
- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (git-fixes).
- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).
- ALSA: usb-audio: add startech usb audio dock name (git-fixes).
- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (git-fixes).
- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (git-fixes).
- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (git-fixes).
- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (git-fixes).
- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).
- ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).
- ALSA: usb-audio: Fix some typos (git-fixes).
- ALSA: usb-audio: fix spelling mistake 'buss' -> 'bus' (git-fixes).
- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (git-fixes).
- ALSA: usb/line6: remove 'defined but not used' warning (git-fixes).
- ALSA: vx_core: remove warning for empty loop body (git-fixes).
- ALSA: xen: remove 'set but not used' warning (git-fixes).
- ALSA: xen: Remove superfluous fall through comments (git-fixes).
- apparmor: ensure that dfa state tables have entries (git-fixes).
- apparmor: fix introspection of of task mode for unconfined tasks (git-fixes).
- apparmor: Fix memory leak of profile proxy (git-fixes).
- apparmor: Fix use-after-free in aa_audit_rule_init (git-fixes).
- apparmor: remove useless aafs_create_symlink (git-fixes).
- appletalk: Fix atalk_proc_init() return path (git-fixes).
- arm64: armv8_deprecated: Fix undef_hook mask for thumb setend (bsc#1175180).
- arm64: cacheflush: Fix KGDB trap detection (bsc#1175188).
- arm64: csum: Fix handling of bad packets (bsc#1175192).
- arm64: dts: allwinner: a64: Remove unused SPDIF sound card (none bsc#1175016).
- arm64: dts: clearfog-gt-8k: set gigabit PHY reset deassert delay (bsc#1175347).
- arm64: dts: exynos: Fix silent hang after boot on Espresso (bsc#1175346).
- arm64: dts: imx8mm-evk: correct ldo1/ldo2 voltage range (none bsc#1175019).
- arm64: dts: imx8qxp-mek: Remove unexisting Ethernet PHY (bsc#1175345).
- arm64: dts: librem5-devkit: add a vbus supply to usb0 (none bsc#1175013).
- arm64: dts: ls1028a: delete extraneous #interrupt-cells for ENETC RCIE (none bsc#1175012).
- arm64: dts: ls1043a-rdb: correct RGMII delay mode to rgmii-id (bsc#1174398).
- arm64: dts: ls1046ardb: set RGMII interfaces to RGMII_ID mode (bsc#1174398).
- arm64: dts: qcom: msm8998-clamshell: Fix label on l15 regulator (git-fixes).
- arm64: dts: rockchip: fix rk3399-puma gmac reset gpio (none bsc#1175021).
- arm64: dts: rockchip: fix rk3399-puma vcc5v0-host gpio (none bsc#1175020).
- arm64: dts: rockchip: Rename dwc3 device nodes on rk3399 to make dtc happy (none bsc#1175015).
- arm64: dts: rockchip: Replace RK805 PMIC node name with 'pmic' on rk3328 boards (none bsc#1175014).
- arm64: dts: uDPU: fix broken ethernet (bsc#1175344).
- arm64: dts: uniphier: Set SCSSI clock and reset IDs for each channel (none bsc#1175011).
- arm64: errata: use arm_smccc_1_1_get_conduit() (bsc#1174906).
- arm64: Fix PTRACE_SYSEMU semantics (bsc#1175185).
- arm64: fix the flush_icache_range arguments in machine_kexec (bsc#1175184).
- arm64: hugetlb: avoid potential NULL dereference (bsc#1175183).
- arm64: hw_breakpoint: Do not invoke overflow handler on uaccess watchpoints (bsc#1175189).
- arm64: insn: Fix two bugs in encoding 32-bit logical immediates (bsc#1175186).
- arm64: kexec_file: print appropriate variable (bsc#1175187).
- arm64: kgdb: Fix single-step exception handling oops (bsc#1175191).
- arm64: Retrieve stolen time as paravirtualized guest (bsc#1172197 jsc#SLE-13593).
- arm64: Retrieve stolen time as paravirtualized guest (bsc#1172197 jsc#SLE-13593).
- arm64: tegra: Enable I2C controller for EEPROM (none bsc#1175010).
- arm64: tegra: Fix ethernet phy-mode for Jetson Xavier (none bsc#1175017).
- arm64: tegra: Fix flag for 64-bit resources in 'ranges' property (none bsc#1175018).
- arm64: tegra: Fix Tegra194 PCIe compatible string (none bsc#1175009).
- arm64: vdso: Add -fasynchronous-unwind-tables to cflags (bsc#1175182).
- arm64: vdso: do not free unallocated pages (bsc#1175181).
- arm/arm64: Make use of the SMCCC 1.1 wrapper (bsc#1174906).
- arm/arm64: Provide a wrapper for SMCCC 1.1 calls (bsc#1174906).
- arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit() (bsc#1174906).
- ARM: percpu.h: fix build error (git-fixes).
- arm: spectre-v2: use arm_smccc_1_1_get_conduit() (bsc#1174906).
- ASoC: codecs: max98373: Removed superfluous volume control from chip default (git-fixes).
- ASoc: codecs: max98373: remove Idle_bias_on to let codec suspend (git-fixes).
- ASoC: fsl_sai: Fix value of FSL_SAI_CR1_RFW_MASK (git-fixes).
- ASoC: hdac_hda: fix deadlock after PCM open error (git-fixes).
- ASoC: Intel: bxt_rt298: add missing .owner field (git-fixes).
- ASoC: Intel: bytcht_es8316: Add missed put_device() (git-fixes).
- ASoC: meson: axg-tdmin: fix g12a skew (git-fixes).
- ASoC: meson: axg-tdm-interface: fix link fmt setup (git-fixes).
- ASoC: meson: fixes the missed kfree() for axg_card_add_tdm_loopback (git-fixes).
- ASoC: rockchip: add format and rate constraints on rk3399 (git-fixes).
- ASoC: rt286: fix unexpected interrupt happens (git-fixes).
- ASoC: rt5670: Add new gpio1_is_ext_spk_en quirk and enable it on the Lenovo Miix 2 10 (git-fixes).
- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).
- ASoC: rt5670: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5682: Report the button event in the headset type only (git-fixes).
- ASoC: SOF: nocodec: add missing .owner field (git-fixes).
- ASoC: topology: fix kernel oops on route addition error (git-fixes).
- ASoC: topology: fix tlvs in error handling for widget_dmixer (git-fixes).
- ASoC: wm8974: fix Boost Mixer Aux Switch (git-fixes).
- ASoC: wm8974: remove unsupported clock mode (git-fixes).
- ath10k: Acquire tx_lock in tx error paths (git-fixes).
- ath10k: enable transmit data ack RSSI for QCA9884 (git-fixes).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).
- ath9k: Fix regression with Atheros 9271 (git-fixes).
- atm: fix atm_dev refcnt leaks in atmtcp_remove_persistent (git-fixes).
- AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).
- AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).
- AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).
- ax88172a: fix ax88172a_unbind() failures (git-fixes).
- b43: Remove uninitialized_var() usage (git-fixes).
- blk-mq: consider non-idle request as 'inflight' in blk_mq_rq_inflight() (bsc#1165933).
- Bluetooth: btmtksdio: fix up firmware download sequence (git-fixes).
- Bluetooth: btusb: fix up firmware download sequence (git-fixes).
- Bluetooth: fix kernel oops in store_pending_adv_report (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (git-fixes).
- Bluetooth: Fix update of connection state in `hci_encrypt_cfm` (git-fixes).
- Bluetooth: hci_h5: Set HCI_UART_RESET_ON_INIT to correct flags (git-fixes).
- Bluetooth: hci_serdev: Only unregister device if it was registered (git-fixes).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (git-fixes).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (git-fixes).
- bnxt_en: Init ethtool link settings after reading updated PHY configuration (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Init ethtool link settings after reading updated PHY configuration (jsc#SLE-8371 bsc#1153274).
- bpf: Do not allow btf_ctx_access with __int128 types (bsc#1155518).
- bpf: Fix map leak in HASH_OF_MAPS map (bsc#1155518).
- bpfilter: fix up a sparse annotation (bsc#1155518).
- bpfilter: Initialize pos variable (bsc#1155518).
- bpfilter: reject kernel addresses (bsc#1155518).
- bpfilter: switch to kernel_write (bsc#1155518).
- bpf: net: Avoid copying sk_user_data of reuseport_array during sk_clone (bsc#1155518).
- bpf: net: Avoid incorrect bpf_sk_reuseport_detach call (bsc#1155518).
- brcmfmac: Set timeout value when configuring power save (bsc#1173468).
- brcmfmac: Transform compatible string for FW loading (bsc#1169771).
- bridge: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).
- bridge: mcast: Fix MLD2 Report IPv6 payload length check (git-fixes).
- btmrvl: Fix firmware filename for sd8977 chipset (git-fixes).
- btmrvl: Fix firmware filename for sd8997 chipset (git-fixes).
- btrfs: add assertions for tree == inode->io_tree to extent IO helpers (bsc#1174438).
- btrfs: avoid unnecessary splits when setting bits on an extent io tree (bsc#1175377).
- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).
- btrfs: delete the ordered isize update code (bsc#1175377).
- btrfs: do not set path->leave_spinning for truncate (bsc#1175377).
- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).
- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).
- btrfs: fix block group leak when removing fails (bsc#1175149).
- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).
- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).
- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).
- btrfs: fix deadlock during fast fsync when logging prealloc extents beyond eof (bsc#1175377).
- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).
- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).
- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).
- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).
- btrfs: fix lost i_size update after cloning inline extent (bsc#1175377).
- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).
- btrfs: fix race between block group removal and block group creation (bsc#1175149).
- btrfs: fix race between shrinking truncate and fiemap (bsc#1175377).
- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).
- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).
- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).
- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).
- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).
- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).
- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).
- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).
- btrfs: introduce per-inode file extent tree (bsc#1175377).
- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).
- btrfs: move extent_io_tree defs to their own header (bsc#1175377).
- btrfs: Move free_pages_out label in inline extent handling branch in compress_file_range (bsc#1175263).
- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).
- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).
- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).
- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).
- btrfs: Remove delalloc_end argument from extent_clear_unlock_delalloc (bsc#1175149).
- btrfs: Remove leftover of in-band dedupe (bsc#1175149).
- btrfs: remove unnecessary delalloc mutex for inodes (bsc#1175377).
- btrfs: Rename btrfs_join_transaction_nolock (bsc#1175377).
- btrfs: replace all uses of btrfs_ordered_update_i_size (bsc#1175377).
- btrfs: separate out the extent io init function (bsc#1175377).
- btrfs: separate out the extent leak code (bsc#1175377).
- btrfs: trim: fix underflow in trim length to prevent access beyond device boundary (bsc#1175263).
- btrfs: use btrfs_ordered_update_i_size in clone_finish_inode_update (bsc#1175377).
- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).
- btrfs: use the file extent tree infrastructure (bsc#1175377).
- bus: ti-sysc: Do not disable on suspend for no-idle (git-fixes).
- cfg80211: check vendor command doit pointer before use (git-fixes).
- clk: actions: Fix h_clk for Actions S500 SoC (git-fixes).
- clk: at91: clk-generated: check best_rate against ranges (git-fixes).
- clk: at91: clk-generated: continue if __clk_determine_rate() returns error (git-fixes).
- clk: at91: sam9x60: fix main rc oscillator frequency (git-fixes).
- clk: at91: sam9x60-pll: check fcore against ranges (git-fixes).
- clk: at91: sam9x60-pll: use logical or for range check (git-fixes).
- clk: at91: sckc: register slow_rc with accuracy option (git-fixes).
- clk: bcm2835: Do not use prediv with bcm2711's PLLs (bsc#1174865).
- clk: bcm63xx-gate: fix last clock availability (git-fixes).
- clk: clk-atlas6: fix return value check in atlas6_clk_init() (git-fixes).
- clk: iproc: round clock rate to the closest (git-fixes).
- clk: qcom: gcc-sdm660: Add missing modem reset (git-fixes).
- clk: qcom: gcc-sdm660: Fix up gcc_mss_mnoc_bimc_axi_clk (git-fixes).
- clk: rockchip: Revert 'fix wrong mmc sample phase shift for rk3328' (git-fixes).
- clk: scmi: Fix min and max rate when registering clocks with discrete rates (git-fixes).
- clk: spear: Remove uninitialized_var() usage (git-fixes).
- clk: st: Remove uninitialized_var() usage (git-fixes).
- console: newport_con: fix an issue about leak related system resources (git-fixes).
- crc-t10dif: Fix potential crypto notify dead-lock (git-fixes).
- crypto: caam - Fix argument type in handle_imx6_err005766 (git-fixes).
- crypto: ccp - Fix use of merged scatterlists (git-fixes).
- crypto: ccree - fix resource leak on error path (git-fixes).
- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).
- crypto: hisilicon - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).
- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).
- dccp: Fix possible memleak in dccp_init and dccp_fini (networking-stable-20_06_16).
- Delete patches.suse/apparmor-Fix-memory-leak-of-profile-proxy.patch (bsc#1174627)
- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).
- devlink: ignore -EOPNOTSUPP errors on dumpit (bsc#1154353).
- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).
- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).
- devres: keep both device name and resource name in pretty name (git-fixes).
- dlm: remove BUG() before panic() (git-fixes).
- dmaengine: dmatest: stop completed threads when running without set channel (git-fixes).
- dmaengine: dw: Initialize channel before each transfer (git-fixes).
- dmaengine: fsl-edma-common: correct DSIZE_32BYTE (git-fixes).
- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).
- dmaengine: fsl-edma: fix wrong tcd endianness for big-endian cpu (git-fixes).
- dmaengine: imx-sdma: Fix: Remove 'always true' comparison (git-fixes).
- dmaengine: ioat setting ioat timeout as module parameter (git-fixes).
- dmaengine: mcf-edma: Fix NULL pointer exception in mcf_edma_tx_handler (git-fixes).
- dmaengine: sh: usb-dmac: set tx_result parameters (git-fixes).
- dmaengine: tegra210-adma: Fix runtime PM imbalance on error (git-fixes).
- dm: do not use waitqueue for request-based DM (bsc#1165933).
- docs: fix memory.low description in cgroup-v2.rst (git-fixes). (SLE documentation might refer to cgroup-v2.rst.)
- dpaa_eth: FMan erratum A050385 workaround (bsc#1174396).
- dpaa_eth: Make dpaa_a050385_wa static (bsc#1174396).
- drbd: Remove uninitialized_var() usage (git-fixes).
- driver core: Avoid binding drivers to dead devices (git-fixes).
- drivers/firmware/psci: Fix memory leakage in alloc_init_cpu_groups() (git-fixes).
- drivers/net/wan: lapb: Corrected the usage of skb_cow (git-fixes).
- drm/amd/display: Clear dm_state for fast updates (git-fixes).
- drm/amd/display: Use kfree() to free rgb_user in calculate_user_regamma_ramp() (git-fixes).
- drm/amdgpu/atomfirmware: fix vram_info fetching for renoir (git-fixes).
- drm/amdgpu/display: use blanked rather than plane state for sync (bsc#1152489) * refreshed for context changes * protect code with CONFIG_DRM_AMD_DC_DCN2_0
- drm/amdgpu: do not do soft recovery if gpu_recovery=0 (git-fixes).
- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (git-fixes).
- drm/amdgpu: fix preemption unit test (git-fixes).
- drm/amdgpu/gfx10: fix race condition for kiq (git-fixes).
- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).
- drm/amdgpu/sdma5: fix wptr overwritten in ->get_wptr() (git-fixes).
- drm/amdgpu: use %u rather than %d for sclk/mclk (git-fixes).
- drm/amd/powerplay: fix a crash when overclocking Vega M (bsc#1152472)
- drm/amd/powerplay: fix a crash when overclocking Vega M (git-fixes).
- drm/arm: fix unintentional integer overflow on left shift (git-fixes).
- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1152472) * refreshed for context changes
- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).
- drm/bridge: ti-sn65dsi86: Clear old error bits before AUX transfers (git-fixes).
- drm/bridge: ti-sn65dsi86: Do not use kernel-doc comment for local array (git-fixes).
- drm/bridge: ti-sn65dsi86: Fix off-by-one error in clock choice (bsc#1152489) * refreshed for context changes
- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1152472) * move drm_mipi_dbi.c -> tinydrm/mipi-dbi.c
- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).
- drm/exynos: fix ref count leak in mic_pre_enable (git-fixes).
- drm/exynos: Properly propagate return value in drm_iommu_attach_device() (git-fixes).
- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (git-fixes).
- drm/gem: Fix a leak in drm_gem_objects_lookup() (git-fixes).
- drm: hold gem reference until object is no longer accessed (git-fixes).
- drm/i915: Actually emit the await_start (bsc#1174737).
- drm/i915: Copy across scheduler behaviour flags across submit fences (bsc#1174737).
- drm/i915: Do not poison i915_request.link on removal (bsc#1174737).
- drm/i915: Drop no-semaphore boosting (bsc#1174737).
- drm/i915: Eliminate the trylock for awaiting an earlier request (bsc#1174737).
- drm/i915/fbc: Fix fence_y_offset handling (bsc#1152489) * context changes
- drm/i915: Flush execution tasklets before checking request status (bsc#1174737).
- drm/i915: Flush tasklet submission before sleeping on i915_request_wait (bsc#1174737).
- drm/i915/gt: Close race between engine_park and intel_gt_retire_requests (git-fixes).
- drm/i915/gt: Flush submission tasklet before waiting/retiring (bsc#1174737).
- drm/i915/gt: Ignore irq enabling on the virtual engines (git-fixes).
- drm/i915/gt: Move new timelines to the end of active_list (git-fixes).
- drm/i915/gt: Only swap to a random sibling once upon creation (bsc#1152489) * context changes
- drm/i915/gt: Unlock engine-pm after queuing the kernel context switch (git-fixes).
- drm/i915: Ignore submit-fences on the same timeline (bsc#1174737).
- drm/i915: Improve the start alignment of bonded pairs (bsc#1174737).
- drm/i915: Keep track of request among the scheduling lists (bsc#1174737).
- drm/i915: Lock signaler timeline while navigating (bsc#1174737).
- drm/i915: Mark i915_request.timeline as a volatile, rcu pointer (bsc#1174737).
- drm/i915: Mark racy read of intel_engine_cs.saturated (bsc#1174737).
- drm/i915: Mark up unlocked update of i915_request.hwsp_seqno (bsc#1174737).
- drm/i915: Move cec_notifier to intel_hdmi_connector_unregister, v2. (bsc#1152489) * context changes
- drm/i915: Peel dma-fence-chains for await (bsc#1174737).
- drm/i915: Prevent using semaphores to chain up to external fences (bsc#1174737).
- drm/i915: Protect i915_request_await_start from early waits (bsc#1174737).
- drm/i915: Pull waiting on an external dma-fence into its routine (bsc#1174737).
- drm/i915: Rely on direct submission to the queue (bsc#1174737).
- drm/i915: Remove wait priority boosting (bsc#1174737).
- drm/i915: Reorder await_execution before await_request (bsc#1174737).
- drm/i915: Return early for await_start on same timeline (bsc#1174737).
- drm/i915: Use EAGAIN for trylock failures (bsc#1174737).
- drm/imx: fix use after free (git-fixes).
- drm/imx: imx-ldb: Disable both channels for split mode in enc->disable() (git-fixes).
- drm/imx: tve: fix regulator_disable error path (git-fixes).
- drm/ingenic: Fix incorrect assumption about plane->index (bsc#1152489) * refreshed for context changes
- drm: mcde: Fix display initialization problem (git-fixes).
- drm/mediatek: Check plane visibility in atomic_update (git-fixes).
- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).
- drm/msm/dpu: allow initialization of encoder locks during encoder init (git-fixes).
- drm/msm: fix potential memleak in error branch (git-fixes).
- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).
- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).
- drm/nouveau/i2c/g94-: increase NV_PMGR_DP_AUXCTL_TRANSACTREQ timeout (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (git-fixes).
- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (git-fixes).
- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).
- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).
- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).
- drm/radeon: fix double free (git-fixes).
- drm/stm: repair runtime power management (git-fixes).
- drm: sun4i: hdmi: Fix inverted HPD result (git-fixes).
- drm/sun4i: tcon: Separate quirks for tcon0 and tcon1 on A20 (git-fixes).
- drm/tegra: hub: Do not enable orphaned window group (git-fixes).
- drm/vgem: Replace opencoded version of drm_gem_dumb_map_offset() (bsc#1152489) * refreshed for context changes
- drm/vmwgfx: Fix two list_for_each loop exit tests (git-fixes).
- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (git-fixes).
- exfat: add missing brelse() calls on error paths (git-fixes).
- exfat: fix incorrect update of stream entry in __exfat_truncate() (git-fixes).
- exfat: fix memory leak in exfat_parse_param() (git-fixes).
- exfat: move setting VOL_DIRTY over exfat_remove_entries() (git-fixes).
- fbdev: Detect integer underflow at 'struct fbcon_ops'->clear_margins (git-fixes).
- firmware: arm_scmi: Fix SCMI genpd domain probing (git-fixes).
- firmware: arm_scmi: Keep the discrete clock rates sorted (git-fixes).
- firmware: arm_sdei: use common SMCCC_CONDUIT_* (bsc#1174906).
- firmware: Fix a reference count leak (git-fixes).
- firmware_loader: fix memory leak for paged buffer (bsc#1175367).
- firmware/psci: use common SMCCC_CONDUIT_* (bsc#1174906).
- firmware: smccc: Add ARCH_SOC_ID support (bsc#1174906).
- firmware: smccc: Add function to fetch SMCCC version (bsc#1174906).
- firmware: smccc: Add HAVE_ARM_SMCCC_DISCOVERY to identify SMCCC v1.1 and above (bsc#1174906).
- firmware: smccc: Add the definition for SMCCCv1.2 version/error codes (bsc#1174906).
- firmware: smccc: Drop smccc_version enum and use ARM_SMCCC_VERSION_1_x instead (bsc#1174906).
- firmware: smccc: Refactor SMCCC specific bits into separate file (bsc#1174906).
- firmware: smccc: Update link to latest SMCCC specification (bsc#1174906).
- fpga: dfl: fix bug in port reset handshake (git-fixes).
- fsl/fman: detect FMan erratum A050385 (bsc#1174396) Update arm64 config file
- fuse: copy_file_range should truncate cache (git-fixes).
- fuse: fix copy_file_range cache issues (git-fixes).
- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175176).
- fuse: fix weird page warning (bsc#1175175).
- geneve: fix an uninitialized value in geneve_changelink() (git-fixes).
- genirq/affinity: Improve __irq_build_affinity_masks() (bsc#1174897 ltc#187090).
- genirq/affinity: Remove const qualifier from node_to_cpumask argument (bsc#1174897 ltc#187090).
- genirq/affinity: Spread vectors on node according to nr_cpu ratio (bsc#1174897 ltc#187090).
- gfs2: Another gfs2_find_jhead fix (bsc#1174824).
- gfs2: fix gfs2_find_jhead that returns uninitialized jhead with seq 0 (bsc#1174825).
- go7007: add sanity checking for endpoints (git-fixes).
- gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).
- gpio: arizona: put pm_runtime in case of failure (git-fixes).
- gpio: max77620: Fix missing release of interrupt (git-fixes).
- gpio: pca953x: disable regmap locking for automatic address incrementing (git-fixes).
- gpio: pca953x: Fix GPIO resource leak on Intel Galileo Gen 2 (git-fixes).
- gpio: pca953x: Override IRQ for one of the expanders on Galileo Gen 2 (git-fixes).
- gpu: host1x: Detach driver on unregister (git-fixes).
- habanalabs: increase timeout during reset (git-fixes).
- HID: alps: support devices with report id 2 (git-fixes).
- HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).
- HID: i2c-hid: add Mediacom FlexBook edge13 to descriptor override (git-fixes).
- HID: logitech-hidpp: avoid repeated 'multiplier = ' log messages (git-fixes).
- HID: magicmouse: do not set up autorepeat (git-fixes).
- HID: quirks: Always poll Obins Anne Pro 2 keyboard (git-fixes).
- HID: quirks: Ignore Simply Automated UPB PIM (git-fixes).
- HID: quirks: Remove ITE 8595 entry from hid_have_special_driver (git-fixes).
- HID: steam: fixes race in handling device list (git-fixes).
- hippi: Fix a size used in a 'pci_free_consistent()' in an error handling path (git-fixes).
- hwmon: (adm1275) Make sure we are reading enough data for different chips (git-fixes).
- hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).
- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (git-fixes).
- hwmon: (nct6775) Accept PECI Calibration as temperature source for NCT6798D (git-fixes).
- hwmon: (scmi) Fix potential buffer overflow in scmi_hwmon_probe() (git-fixes).
- hwrng: ks-sa - Fix runtime PM imbalance on error (git-fixes).
- i2c: also convert placeholder function to return errno (git-fixes).
- i2c: eg20t: Load module automatically if ID matches (git-fixes).
- i2c: i2c-qcom-geni: Fix DMA transfer race (git-fixes).
- i2c: iproc: fix race between client unreg and isr (git-fixes).
- i2c: rcar: always clear ICSAR to avoid side effects (git-fixes).
- i2c: rcar: avoid race when unregistering slave (git-fixes).
- i2c: rcar: slave: only send STOP event when we have been addressed (git-fixes).
- i2c: slave: add sanity check when unregistering (git-fixes).
- i2c: slave: improve sanity check when registering (git-fixes).
- i40iw: Do an RCU lookup in i40iw_add_ipv4_addr (git-fixes).
- i40iw: Fix error handling in i40iw_manage_arp_cache() (git-fixes).
- i40iw: fix null pointer dereference on a null wqe pointer (git-fixes).
- i40iw: Report correct firmware version (git-fixes).
- IB/cma: Fix ports memory leak in cma_configfs (git-fixes).
- IB/core: Fix potential NULL pointer dereference in pkey cache (git-fixes).
- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Ensure pq is not left on waitlist (git-fixes).
- IB/hfi1: Fix another case where pq is left on waitlist (bsc#1174411).
- IB/hfi1: Fix memory leaks in sysfs registration and unregistration (git-fixes).
- IB/hfi1: Fix module use count flaw due to leftover module put calls (bsc#1174407).
- IB/hfi1, qib: Ensure RCU is locked when accessing list (git-fixes).
- IB/ipoib: Fix double free of skb in case of multicast traffic in CM mode (git-fixes).
- IB/mad: Fix use after free when destroying MAD agent (git-fixes).
- IB/mlx4: Test return value of calls to ib_get_cached_pkey (git-fixes).
- IB/mlx5: Fix 50G per lane indication (git-fixes).
- IB/mlx5: Fix DEVX support for MLX5_CMD_OP_INIT2INIT_QP command (git-fixes).
- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (git-fixes).
- IB/mlx5: Replace tunnel mpls capability bits for tunnel_offloads (git-fixes).
- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).
- IB/qib: Call kobject_put() when kobject_init_and_add() fails (git-fixes).
- IB/rdmavt: Always return ERR_PTR from rvt_create_mmap_info() (git-fixes).
- IB/rdmavt: Delete unused routine (git-fixes).
- IB/rdmavt: Fix RQ counting issues causing use of an invalid RWQE (bsc#1174770).
- IB/sa: Resolv use-after-free in ib_nl_make_request() (git-fixes).
- ide: Remove uninitialized_var() usage (git-fixes).
- ieee802154: fix one possible memleak in adf7242_probe (git-fixes).
- iio: adc: ad7780: Fix a resource handling path in 'ad7780_probe()' (git-fixes).
- iio: core: add missing IIO_MOD_H2/ETHANOL string identifiers (git-fixes).
- iio:health:afe4404 Fix timestamp alignment and prevent data leak (git-fixes).
- iio:humidity:hdc100x Fix alignment and data leak issues (git-fixes).
- iio:humidity:hts221 Fix alignment and data leak issues (git-fixes).
- iio: improve IIO_CONCENTRATION channel type description (git-fixes).
- iio:magnetometer:ak8974: Fix alignment and data leak issues (git-fixes).
- iio: magnetometer: ak8974: Fix runtime PM imbalance on error (git-fixes).
- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (git-fixes).
- iio:pressure:ms5611 Fix buffer element alignment (git-fixes).
- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (git-fixes).
- Input: elan_i2c - add more hardware ID for Lenovo laptops (git-fixes).
- Input: elan_i2c - only increment wakeup count on touch (git-fixes).
- Input: goodix - fix touch coordinates on Cube I15-TC (git-fixes).
- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (git-fixes).
- Input: mms114 - add extra compatible for mms345l (git-fixes).
- Input: sentelic - fix error return when fsp_reg_write fails (git-fixes).
- Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).
- integrity: remove redundant initialization of variable ret (git-fixes).
- intel_th: Fix a NULL dereference when hub driver is not loaded (git-fixes).
- intel_th: pci: Add Emmitsburg PCH support (git-fixes).
- intel_th: pci: Add Jasper Lake CPU support (git-fixes).
- intel_th: pci: Add Tiger Lake PCH-H support (git-fixes).
- io-mapping: indicate mapping failure (git-fixes).
- iommu/arm-smmu-v3: Do not reserve implementation defined register space (bsc#1174126).
- iommu/vt-d: Enable PCI ACS for platform opt in hint (bsc#1174127).
- iommu/vt-d: Update scalable mode paging structure coherency (bsc#1174128).
- ionic: centralize queue reset code (bsc#1167773).
- ionic: fix up filter locks and debug msgs (bsc#1167773).
- ionic: keep rss hash after fw update (bsc#1167773).
- ionic: unlock queue mutex in error path (bsc#1167773).
- ionic: update filter id after replay (bsc#1167773).
- ionic: update the queue count on open (bsc#1167773).
- ionic: use mutex to protect queue operations (bsc#1167773).
- ionic: use offset for ethtool regs data (bsc#1167773).
- irqchip/gic: Atomically update affinity (bsc#1175195).
- kabi fix for SUNRPC-dont-update-timeout-value-on-connection-reset.patch (bsc1174263).
- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).
- kABI: restore signature of xfrm_policy_bysel_ctx() and xfrm_policy_byid() (bsc#1174645).
- kABI workaround for enum cpuhp_state (git-fixes).
- kABI workaround for struct kvm_device (git-fixes). Just change an variable to 'const' type in kvm_device.
- kABI workaround for struct kvm_vcpu_arch (git-fixes).
- kernel.h: remove duplicate include of asm/div64.h (git-fixes).
- keys: asymmetric: fix error return code in software_key_query() (git-fixes).
- kobject: Avoid premature parent object freeing in kobject_cleanup() (git-fixes).
- KVM: Allow kvm_device_ops to be const (bsc#1172197 jsc#SLE-13593).
- KVM: Allow kvm_device_ops to be const (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Annotate hyp NMI-related functions as __always_inline (bsc#1175190).
- KVM: arm64: Correct PSTATE on exception entry (bsc#1133021).
- KVM: arm64: Document PV-time interface (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Document PV-time interface (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Fix 32bit PC wrap-around (bsc#1133021).
- KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Make vcpu_cp1x() work on Big Endian hosts (bsc#1133021).
- KVM: arm64: Provide VCPU attributes for stolen time (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Provide VCPU attributes for stolen time (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than SCHEDSTATS (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than SCHEDSTATS (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Stop writing aarch32's CSSELR into ACTLR (bsc#1133021).
- KVM: arm64: Support stolen time reporting via shared structure (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Support stolen time reporting via shared structure (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Use the correct timer structure to access the physical counter (bsc#1133021).
- KVM: arm/arm64: Correct AArch32 SPSR on exception entry (bsc#1133021).
- KVM: arm/arm64: Correct CPSR on exception entry (bsc#1133021).
- KVM: arm/arm64: Factor out hypercall handling from PSCI code (bsc#1172197 jsc#SLE-13593).
- KVM: arm/arm64: Factor out hypercall handling from PSCI code (bsc#1172197 jsc#SLE-13593).
- KVM: arm: vgic: Fix limit condition when writing to GICD_IACTIVER (bsc#1133021).
- KVM: Implement kvm_put_guest() (bsc#1172197 jsc#SLE-13593).
- KVM: nVMX: always update CR3 in VMCS (git-fixes).
- KVM: Play nice with read-only memslots when querying host page size (bsc#1133021).
- KVM: s390: Remove false WARN_ON_ONCE for the PQAP instruction (bsc#1133021).
- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).
- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).
- leds: 88pm860x: fix use-after-free on unbind (git-fixes).
- leds: core: Flush scheduled work for system suspend (git-fixes).
- leds: da903x: fix use-after-free on unbind (git-fixes).
- leds: gpio: Fix semantic error (git-fixes).
- leds: lm3533: fix use-after-free on unbind (git-fixes).
- leds: lm355x: avoid enum conversion warning (git-fixes).
- leds: lm36274: fix use-after-free on unbind (git-fixes).
- leds: wm831x-status: fix use-after-free on unbind (git-fixes).
- libbpf: Wrap source argument of BPF_CORE_READ macro in parentheses (bsc#1155518).
- lib: Reduce user_access_begin() boundaries in strncpy_from_user() and strnlen_user() (bsc#1174331).
- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).
- locktorture: Print ratio of acquisitions, not failures (bsc#1149032).
- mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).
- mac80211: fix misplaced while instead of if (git-fixes).
- mac80211: mesh: Free ie data when leaving mesh (git-fixes).
- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).
- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).
- media: cxusb-analog: fix V4L2 dependency (git-fixes).
- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).
- media: firewire: Using uninitialized values in node_probe() (git-fixes).
- media: marvell-ccic: Add missed v4l2_async_notifier_cleanup() (git-fixes).
- media: media-request: Fix crash if memory allocation fails (git-fixes).
- media: nuvoton-cir: remove setting tx carrier functions (git-fixes).
- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).
- media: sur40: Remove uninitialized_var() usage (git-fixes).
- media: vsp1: dl: Fix NULL pointer dereference on unbind (git-fixes).
- mei: bus: do not clean driver pointer (git-fixes).
- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).
- mfd: dln2: Run event handler loop under spinlock (git-fixes).
- mfd: intel-lpss: Add Intel Jasper Lake PCI IDs (jsc#SLE-12602).
- mlxsw: core: Fix wrong SFP EEPROM reading for upper pages 1-3 (bsc#1154488).
- mlxsw: core: Use different get_trend() callbacks for different thermal zones (networking-stable-20_06_10).
- mmc: meson-gx: limit segments to 1 when dram-access-quirk is needed (git-fixes).
- mmc: sdhci: do not enable card detect interrupt for gpio cd type (git-fixes).
- mm: Fix protection usage propagation (bsc#1174002).
- mm/mmap.c: close race between munmap() and expand_upwards()/downwards() (bsc#1174527).
- mtd: properly check all write ioctls for permissions (git-fixes).
- mtd: rawnand: fsl_upm: Remove unused mtd var (git-fixes).
- mtd: rawnand: qcom: avoid write to unavailable register (git-fixes).
- mwifiex: Fix firmware filename for sd8977 chipset (git-fixes).
- mwifiex: Fix firmware filename for sd8997 chipset (git-fixes).
- mwifiex: Prevent memory corruption handling keys (git-fixes).
- nbd: Fix memory leak in nbd_add_socket (git-fixes).
- ndctl/papr_scm,uapi: Add support for PAPR nvdimm specific methods (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).
- net/bpfilter: Initialize pos in __bpfilter_process_sockopt (bsc#1155518).
- net/bpfilter: split __bpfilter_process_sockopt (bsc#1155518).
- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).
- netdevsim: fix unbalaced locking in nsim_create() (git-fixes).
- net: dsa: bcm_sf2: Fix node reference count (git-fixes).
- net: ena: add reserved PCI device ID (bsc#1174852).
- net: ena: add support for reporting of packet drops (bsc#1174852).
- net: ena: add support for the rx offset feature (bsc#1174852).
- net: ena: add support for traffic mirroring (bsc#1174852).
- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).
- net: ena: allow setting the hash function without changing the key (bsc#1174852).
- net: ena: avoid memory access violation by validating req_id properly (bsc#1174852).
- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).
- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).
- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).
- net: ena: changes to RSS hash key allocation (bsc#1174852).
- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).
- net: ena: cosmetic: code reorderings (bsc#1174852).
- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).
- net: ena: cosmetic: fix line break issues (bsc#1174852).
- net: ena: cosmetic: fix spacing issues (bsc#1174852).
- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).
- net: ena: cosmetic: minor code changes (bsc#1174852).
- net: ena: cosmetic: remove unnecessary code (bsc#1174852).
- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).
- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).
- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).
- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).
- net: ena: drop superfluous prototype (bsc#1174852).
- net: ena: enable support of rss hash key and function changes (bsc#1174852).
- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).
- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).
- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).
- net: ena: fix continuous keep-alive resets (bsc#1174852).
- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).
- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).
- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).
- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).
- net: ena: Make some functions static (bsc#1174852).
- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).
- net: ena: reduce driver load time (bsc#1174852).
- net: ena: remove code that does nothing (bsc#1174852).
- net: ena: remove set but not used variable 'hash_key' (bsc#1174852).
- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).
- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).
- net: ena: support new LLQ acceleration mode (bsc#1174852).
- net: ena: use explicit variable size for clarity (bsc#1174852).
- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).
- net_failover: fixed rollback in net_failover_open() (networking-stable-20_06_10).
- netfilter: ip6tables: Add a .pre_exit hook in all ip6table_foo.c (bsc#1171857).
- netfilter: ip6tables: Split ip6t_unregister_table() into pre_exit and exit helpers (bsc#1171857).
- netfilter: iptables: Add a .pre_exit hook in all iptable_foo.c (bsc#1171857).
- netfilter: iptables: Split ipt_unregister_table() into pre_exit and exit helpers (bsc#1171857).
- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)
- net: fsl/fman: treat all RGMII modes in memac_adjust_link() (bsc#1174398).
- net: hns3: check reset pending after FLR prepare (bsc#1154353).
- net: hns3: fix error handling for desc filling (git-fixes).
- net: hns3: fix for not calculating TX BD send size correctly (git-fixes).
- net: hns3: fix return value error when query MAC link status fail (git-fixes).
- net: ipv4: Fix wrong type conversion from hint to rt in ip_route_use_hint() (bsc#1154353).
- net: lan78xx: add missing endpoint sanity check (git-fixes).
- net: lan78xx: fix transfer-buffer memory leak (git-fixes).
- net: lan78xx: replace bogus endpoint lookup (git-fixes).
- net: macb: call pm_runtime_put_sync on failure path (git-fixes).
- net/mlx5: drain health workqueue in case of driver load error (networking-stable-20_06_16).
- net/mlx5e: Fix CPU mapping after function reload to avoid aRFS RX crash (jsc#SLE-8464).
- net/mlx5e: Fix CPU mapping after function reload to avoid aRFS RX crash (jsc#SLE-8464).
- net/mlx5e: Fix kernel crash when setting vf VLANID on a VF dev (jsc#SLE-8464).
- net/mlx5e: Fix kernel crash when setting vf VLANID on a VF dev (jsc#SLE-8464).
- net/mlx5e: Fix repeated XSK usage on one channel (networking-stable-20_06_16).
- net/mlx5e: Fix VXLAN configuration restore after function reload (jsc#SLE-8464).
- net/mlx5e: Fix VXLAN configuration restore after function reload (jsc#SLE-8464).
- net/mlx5: E-switch, Destroy TSAR when fail to enable the mode (jsc#SLE-8464).
- net/mlx5: E-switch, Destroy TSAR when fail to enable the mode (jsc#SLE-8464).
- net/mlx5: Fix fatal error handling during device load (networking-stable-20_06_16).
- net: phy: Check harder for errors in get_phy_id() (git-fixes).
- net: phy: fix memory leak in device-create error path (git-fixes).
- net: phy: realtek: add support for configuring the RX delay on RTL8211F (bsc#1174398).
- net, sk_msg: Clear sk_user_data pointer on clone if tagged (bsc#1155518).
- net, sk_msg: Do not use RCU_INIT_POINTER on sk_user_data (bsc#1155518).
- net/smc: fix restoring of fallback changes (git-fixes).
- net: stmmac: do not attach interface until resume finishes (bsc#1174072).
- net: stmmac: dwc-qos: avoid clk and reset for acpi device (bsc#1174072).
- net: stmmac: dwc-qos: use generic device api (bsc#1174072).
- net: stmmac: enable timestamp snapshot for required PTP packets in dwmac v5.10a (networking-stable-20_06_07).
- net: stmmac: platform: fix probe for ACPI devices (bsc#1174072).
- net/tls: fix encryption error checking (git-fixes).
- net/tls: free record only on encryption error (git-fixes).
- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).
- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).
- nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).
- nfp: flower: fix used time of merge flow statistics (networking-stable-20_06_07).
- NFS: Fix interrupted slots by sending a solo SEQUENCE operation (bsc#1174264).
- NTB: Fix static check warning in perf_clear_test (git-fixes).
- NTB: Fix the default port and peer numbers for legacy drivers (git-fixes).
- ntb: hw: remove the code that sets the DMA mask (git-fixes).
- NTB: ntb_pingpong: Choose doorbells based on port number (git-fixes).
- NTB: ntb_test: Fix bug when counting remote files (git-fixes).
- NTB: ntb_tool: reading the link file should not end in a NULL byte (git-fixes).
- NTB: perf: Do not require one more memory window than number of peers (git-fixes).
- NTB: perf: Fix race condition when run with ntb_test (git-fixes).
- NTB: perf: Fix support for hardware that does not have port numbers (git-fixes).
- ntb_perf: pass correct struct device to dma_alloc_coherent (git-fixes).
- NTB: Revert the change to use the NTB device dev for DMA allocations (git-fixes).
- ntb_tool: pass correct struct device to dma_alloc_coherent (git-fixes).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: fix remounting needed after setfacl command (bsc#1173954).
- ocfs2: load global_inode_alloc (bsc#1172963).
- omapfb: dss: Fix max fclk divider for omap36xx (git-fixes).
- ovl: inode reference leak in ovl_is_inuse true case (git-fixes).
- padata: add separate cpuhp node for CPUHP_PADATA_DEAD (git-fixes).
- padata: kABI fixup for struct padata_instance splitting nodes (git-fixes).
- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).
- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).
- PCI/ASPM: Add missing newline in sysfs 'policy' (git-fixes).
- PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes).
- PCI: cadence: Fix updating Vendor ID and Subsystem Vendor ID register (git-fixes).
- PCI/EDR: Log only ACPI_NOTIFY_DISCONNECT_RECOVER events (bsc#1174513).
- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).
- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).
- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201).
- PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).
- PCI: qcom: Add missing reset for ipq806x (git-fixes).
- PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).
- PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).
- PCI: rcar: Fix runtime PM imbalance on error (git-fixes).
- PCI: Release IVRS table in AMD ACS quirk (git-fixes).
- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).
- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).
- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).
- PCI: tegra: Revert tegra124 raw_violation_fixup (git-fixes).
- percpu: Separate decrypted varaibles anytime encryption can be enabled (bsc#1174332).
- phy: armada-38x: fix NETA lockup when repeatedly switching speeds (git-fixes).
- phy: exynos5-usbdrd: Calibrating makes sense only for USB2.0 PHY (git-fixes).
- phy: renesas: rcar-gen3-usb2: move irq registration to init (git-fixes).
- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).
- pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).
- pinctrl: ingenic: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).
- pinctrl: single: fix function name in documentation (git-fixes).
- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).
- platform/chrome: cros_ec_ishtp: Fix a double-unlock issue (git-fixes).
- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).
- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).
- platform/x86: ISST: Increase timeout (bsc#1174185).
- PM: wakeup: Show statistics for deleted wakeup sources again (git-fixes).
- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).
- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).
- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).
- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).
- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).
- powerpc: Document details on H_SCM_HEALTH hcall (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).
- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).
- powerpc/kasan: Fix issues by lowering KASAN_SHADOW_END (git-fixes).
- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).
- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).
- powerpc/papr_scm: Add support for fetching nvdimm 'fuel-gauge' metric (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Fetch nvdimm health information from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Fetch nvdimm performance stats from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Implement support for PAPR_PDSM_HEALTH (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Improve error logging and handling papr_scm_ndctl() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Mark papr_scm_ndctl() as static (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).
- powerpc/pseries: PCIE PHB reset (bsc#1174689).
- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).
- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).
- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).
- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).
- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).
- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).
- qed: suppress 'do not support RoCE & iWARP' flooding on HW init (git-fixes).
- qed: suppress false-positives interrupt error messages on HW init (git-fixes).
- r8169: fix jumbo configuration for RTL8168evl (bsc#1175296).
- r8169: fix jumbo packet handling on resume from suspend (bsc#1175296).
- r8169: fix resume on cable plug-in (bsc#1175296).
- r8169: fix rtl_hw_jumbo_disable for RTL8168evl (bsc#1175296).
- r8169: move disabling interrupt coalescing to RTL8169/RTL8168 init (bsc#1175296).
- r8169: read common register for PCI commit (bsc#1175296).
- random32: move the pseudo-random 32-bit definitions to prandom.h (git-fixes).
- random32: remove net_rand_state from the latent entropy gcc plugin (git-fixes).
- random: fix circular include dependency on arm64 after addition of percpu.h (git-fixes).
- RDMA/cm: Add missing locking around id.state in cm_dup_req_handler (git-fixes).
- RDMA/cma: Protect bind_list and listen_list while finding matching cm id (git-fixes).
- RDMA/cm: Fix an error check in cm_alloc_id_priv() (git-fixes).
- RDMA/cm: Fix checking for allowed duplicate listens (git-fixes).
- RDMA/cm: Fix ordering of xa_alloc_cyclic() in ib_create_cm_id() (git-fixes).
- RDMA/cm: Read id.state under lock when doing pr_debug() (git-fixes).
- RDMA/cm: Remove a race freeing timewait_info (git-fixes).
- RDMA/cm: Update num_paths in cma_resolve_iboe_route error flow (git-fixes).
- RDMA/core: Fix double destruction of uobject (git-fixes).
- RDMA/core: Fix double put of resource (git-fixes).
- RDMA/core: Fix missing error check on dev_set_name() (git-fixes).
- RDMA/core: Fix protection fault in ib_mr_pool_destroy (git-fixes).
- RDMA/core: Fix race between destroy and release FD object (git-fixes).
- RDMA/core: Fix race in rdma_alloc_commit_uobject() (git-fixes).
- RDMA/core: Prevent mixed use of FDs between shared ufiles (git-fixes).
- RDMA/counter: Query a counter before release (git-fixes).
- RDMA/efa: Set maximum pkeys device attribute (git-fixes).
- RDMA/hns: Bugfix for querying qkey (git-fixes).
- RDMA/hns: Fix cmdq parameter of querying pf timer resource (git-fixes).
- RDMA/iwcm: Fix iwcm work deallocation (git-fixes).
- RDMA/iw_cxgb4: Fix incorrect function parameters (git-fixes).
- RDMA/mad: Do not crash if the rdma device does not have a umad interface (git-fixes).
- RDMA/mad: Fix possible memory leak in ib_mad_post_receive_mads() (git-fixes).
- RDMA/mlx4: Initialize ib_spec on the stack (git-fixes).
- RDMA/mlx5: Add init2init as a modify command (git-fixes).
- RDMA/mlx5: Fix access to wrong pointer while performing flush due to error (git-fixes).
- RDMA/mlx5: Fix prefetch memory leak if get_prefetchable_mr fails (jsc#SLE-8446).
- RDMA/mlx5: Fix prefetch memory leak if get_prefetchable_mr fails (jsc#SLE-8446).
- RDMA/mlx5: Fix the number of hwcounters of a dynamic counter (git-fixes).
- RDMA/mlx5: Fix udata response upon SRQ creation (git-fixes).
- RDMA/mlx5: Prevent prefetch from racing with implicit destruction (jsc#SLE-8446).
- RDMA/mlx5: Prevent prefetch from racing with implicit destruction (jsc#SLE-8446).
- RDMA/mlx5: Set GRH fields in query QP on RoCE (git-fixes).
- RDMA/mlx5: Use xa_lock_irq when access to SRQ table (git-fixes).
- RDMA/mlx5: Verify that QP is created with RQ or SQ (git-fixes).
- RDMA/nldev: Fix crash when set a QP to a new counter but QPN is missing (git-fixes).
- RDMA/pvrdma: Fix missing pci disable in pvrdma_pci_probe() (git-fixes).
- RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (git-fixes).
- RDMA/rvt: Fix potential memory leak caused by rvt_alloc_rq (git-fixes).
- RDMA/rxe: Always return ERR_PTR from rxe_create_mmap_info() (git-fixes).
- RDMA/rxe: Fix configuration of atomic queue pair attributes (git-fixes).
- RDMA/rxe: Set default vendor ID (git-fixes).
- RDMA/rxe: Set sys_image_guid to be aligned with HW IB devices (git-fixes).
- RDMA/siw: Fix failure handling during device creation (git-fixes).
- RDMA/siw: Fix passive connection establishment (git-fixes).
- RDMA/siw: Fix pointer-to-int-cast warning in siw_rx_pbl() (git-fixes).
- RDMA/siw: Fix potential siw_mem refcnt leak in siw_fastreg_mr() (git-fixes).
- RDMA/siw: Fix reporting vendor_part_id (git-fixes).
- RDMA/siw: Fix setting active_mtu attribute (git-fixes).
- RDMA/siw: Fix setting active_{speed, width} attributes (git-fixes).
- RDMA/ucma: Put a lock around every call to the rdma_cm layer (git-fixes).
- RDMA/uverbs: Fix create WQ to use the given user handle (git-fixes).
- regmap: debugfs: check count when read regmap file (git-fixes).
- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (git-fixes).
- regmap: dev_get_regmap_match(): fix string comparison (git-fixes).
- regmap: fix alignment issue (git-fixes).
- regmap: Fix memory leak from regmap_register_patch (git-fixes).
- regulator: gpio: Honor regulator-boot-on property (git-fixes).
- remoteproc: qcom_q6v5_mss: Validate MBA firmware size before load (git-fixes).
- remoteproc: qcom_q6v5_mss: Validate modem blob firmware size before load (git-fixes).
- remoteproc: qcom: q6v5: Update running state before requesting stop (git-fixes).
- Revert 'ALSA: hda: call runtime_allow() for all hda controllers' (git-fixes).
- Revert 'drm/amd/display: Expose connector VRR range via debugfs' (bsc#1152489) * refreshed for context changes
- Revert 'drm/amdgpu: Fix NULL dereference in dpm sysfs handlers' (git-fixes).
- Revert 'i2c: cadence: Fix the hold bit setting' (git-fixes).
- Revert 'RDMA/cma: Simplify rdma_resolve_addr() error flow' (git-fixes).
- Revert 'thermal: mediatek: fix register index error' (git-fixes).
- rhashtable: Document the right function parameters (bsc#1174880).
- rhashtable: drop duplicated word in <linux/rhashtable.h> (bsc#1174880).
- rhashtable: Drop raw RCU deref in nested_table_free (bsc#1174880).
- rhashtable: Fix unprotected RCU dereference in __rht_ptr (bsc#1174880).
- rhashtable: Restore RCU marking on rhash_lock_head (bsc#1174880).
- RMDA/cm: Fix missing ib_cm_destroy_id() in ib_cm_insert_listen() (git-fixes).
- rpm/kernel-obs-build.spec.in: Enable overlayfs Overlayfs is needed for podman or docker builds when no more specific driver can be used (like lvm or btrfs). As the default build fs is ext4 currently, we need overlayfs kernel modules to be available.
- rpm/modules.fips: add ecdh_generic (boo#1173813)
- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).
- rtnetlink: Fix memory(net_device) leak when ->newlink fails (bsc#1154353).
- rtnetlink: Fix memory(net_device) leak when ->newlink fails (git-fixes).
- rtw88: fix LDPC field for RA info (git-fixes).
- rtw88: fix short GI capability based on current bandwidth (git-fixes).
- s390: fix syscall_get_error for compat processes (git-fixes).
- s390/ism: fix error return code in ism_probe() (git-fixes).
- s390/kaslr: add support for R_390_JMP_SLOT relocation type (git-fixes).
- s390/pci: Fix s390_mmio_read/write with MIO (git-fixes).
- s390/qdio: consistently restore the IRQ handler (git-fixes).
- s390/qdio: put thinint indicator after early error (git-fixes).
- s390/qdio: tear down thinint indicator after early error (git-fixes).
- s390/qeth: fix error handling for isolation mode cmds (git-fixes).
- sched/fair: handle case of task_h_load() returning 0 (bnc#1155798 (CPU scheduler functional and performance backports)).
- scsi: ipr: Fix softlockup when rescanning devices in petitboot (jsc#SLE-13654).
- scsi: ipr: Fix softlockup when rescanning devices in petitboot (jsc#SLE-13654).
- scsi: ipr: remove unneeded semicolon (jsc#SLE-13654).
- scsi: ipr: Use scnprintf() for avoiding potential buffer overflow (jsc#SLE-13654).
- scsi: ipr: Use scnprintf() for avoiding potential buffer overflow (jsc#SLE-13654).
- scsi: libfc: free response frame from GPN_ID (bsc#1173849).
- scsi: libfc: Handling of extra kref (bsc#1173849).
- scsi: libfc: If PRLI rejected, move rport to PLOGI state (bsc#1173849).
- scsi: libfc: rport state move to PLOGI if all PRLI retry exhausted (bsc#1173849).
- scsi: libfc: Skip additional kref updating work event (bsc#1173849).
- scsi: ufs-bsg: Fix runtime PM imbalance on error (git-fixes).
- scsi: zfcp: Fix panic on ERP timeout for previously dismissed ERP action (git-fixes).
- selftests/net: in rxtimestamp getopt_long needs terminating null entry (networking-stable-20_06_16).
- selinux: fall back to ref-walk if audit is required (bsc#1174333).
- selinux: revert 'stop passing MAY_NOT_BLOCK to the AVC upon follow_link' (bsc#1174333).
- seq_buf: Export seq_buf_printf (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- seq_buf: Export seq_buf_printf (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- serial: 8250: fix null-ptr-deref in serial8250_start_tx() (git-fixes).
- serial: 8250_mtk: Fix high-speed baud rates clamping (git-fixes).
- serial: 8250_pci: Move Pericom IDs to pci_ids.h (git-fixes).
- serial: 8250_tegra: Create Tegra specific 8250 driver (bsc#1173941).
- serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes).
- serial: exar: Fix GPIO configuration for Sealevel cards based on XR17V35X (git-fixes).
- serial: mxs-auart: add missed iounmap() in probe failure and remove (git-fixes).
- serial: tegra: fix CREAD handling for PIO (git-fixes).
- SMB3: Honor lease disabling for multiuser mounts (git-fixes).
- soc/tegra: pmc: Enable PMIC wake event on Tegra210 (bsc#1175116).
- soundwire: intel: fix memory leak with devm_kasprintf (git-fixes).
- spi: davinci: Remove uninitialized_var() usage (git-fixes).
- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).
- spi: lantiq-ssc: Fix warning by using WQ_MEM_RECLAIM (git-fixes).
- spi: mediatek: use correct SPI_CFG2_REG MACRO (git-fixes).
- spi: rockchip: Fix error in SPI slave pio read (git-fixes).
- spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).
- spi: spidev: fix a race between spidev_release and spidev_remove (git-fixes).
- spi: spi-geni-qcom: Actually use our FIFO (git-fixes).
- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (git-fixes).
- spi: sun4i: update max transfer size reported (git-fixes).
- staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).
- staging: comedi: verify array index is correct before using it (git-fixes).
- Staging: rtl8188eu: rtw_mlme: Fix uninitialized variable authmode (git-fixes).
- staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).
- staging: rtl8712: handle firmware load failure (git-fixes).
- staging: vchiq_arm: Add a matching unregister call (git-fixes).
- staging: wlan-ng: properly check endpoint types (git-fixes).
- SUNRPC dont update timeout value on connection reset (bsc#1174263).
- sunrpc: Fix gss_unwrap_resp_integ() again (bsc#1174116).
- tcp: md5: allow changing MD5 keys in all socket states (git-fixes).
- thermal/drivers: imx: Fix missing of_node_put() at probe time (git-fixes).
- thermal: int3403_thermal: Downgrade error message (git-fixes).
- thermal: ti-soc-thermal: Fix reversed condition in ti_thermal_expose_sensor() (git-fixes).
- tpm_crb: fix fTPM on AMD Zen+ CPUs (bsc#1174362).
- tpm: Require that all digests are present in TCG_PCR_EVENT2 structures (git-fixes).
- tpm_tis: extra chip->ops check on error path in tpm_tis_core_init (git-fixes).
- tty: hvc_console, fix crashes on parallel open/close (git-fixes).
- ubsan: check panic_on_warn (bsc#1174805).
- udp: Copy has_conns in reuseport_grow() (git-fixes).
- udp: Improve load balancing for SO_REUSEPORT (git-fixes).
- uio_pdrv_genirq: Remove warning when irq is not specified (bsc#1174762).
- USB: c67x00: fix use after free in c67x00_giveback_urb (git-fixes).
- usb: chipidea: core: add wakeup support for extcon (git-fixes).
- usb: core: fix quirks_param_set() writing to a const pointer (git-fixes).
- usb: dwc2: Fix shutdown callback in platform (git-fixes).
- usb: dwc2: gadget: Make use of GINTMSK2 (git-fixes).
- usb: dwc3: pci: add support for the Intel Jasper Lake (git-fixes).
- usb: dwc3: pci: add support for the Intel Tiger Lake PCH -H variant (git-fixes).
- usb: dwc3: pci: Fix reference count leak in dwc3_pci_resume_work (git-fixes).
- usb: gadget: Fix issue with config_ep_by_speed function (git-fixes).
- usb: gadget: f_uac2: fix AC Interface Header Descriptor wTotalLength (git-fixes).
- usb: gadget: function: fix missing spinlock in f_uac1_legacy (git-fixes).
- usb: gadget: udc: atmel: fix uninitialized read in debug printk (git-fixes).
- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (git-fixes).
- usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes).
- usb: hso: check for return value in hso_serial_common_create() (git-fixes).
- usb: hso: Fix debug compile warning on sparc32 (git-fixes).
- USB: iowarrior: fix up report size handling for some devices (git-fixes).
- usbip: tools: fix module name in man page (git-fixes).
- usbnet: smsc95xx: Fix use-after-free after removal (git-fixes).
- USB: serial: ch341: add new Product ID for CH340 (git-fixes).
- USB: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).
- USB: serial: cp210x: re-enable auto-RTS on open (git-fixes).
- USB: serial: cypress_m8: enable Simply Automated UPB PIM (git-fixes).
- USB: serial: iuu_phoenix: fix led-activity helpers (git-fixes).
- USB: serial: iuu_phoenix: fix memory corruption (git-fixes).
- USB: serial: option: add GosunCn GM500 series (git-fixes).
- USB: serial: option: add Quectel EG95 LTE modem (git-fixes).
- USB: serial: qcserial: add EM7305 QDL product ID (git-fixes).
- usb: tegra: Fix allocation for the FPCI context (git-fixes).
- usb: xhci: define IDs for various ASMedia host controllers (git-fixes).
- usb: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).
- usb: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).
- usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).
- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174129).
- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).
- video: pxafb: Fix the function used to balance a 'dma_alloc_coherent()' call (git-fixes).
- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).
- virt: vbox: Fix guest capabilities mask check (git-fixes).
- virt: vbox: Fix VBGL_IOCTL_VMMDEV_REQUEST_BIG and _LOG req numbers to match upstream (git-fixes).
- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).
- vt: Reject zero-sized screen buffer size (git-fixes).
- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).
- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (git-fixes).
- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (git-fixes).
- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (git-fixes).
- watchdog: initialize device before misc_register (git-fixes).
- watchdog: iTCO: Add support for Cannon Lake PCH iTCO (jsc#SLE-13202).
- watchdog: iTCO: Add support for Cannon Lake PCH iTCO (jsc#SLE-13202).
- wireless: Use linux/stddef.h instead of stddef.h (git-fixes).
- wireless: Use offsetof instead of custom macro (git-fixes).
- wl1251: fix always return 0 error (git-fixes).
- workqueue: Remove unnecessary kfree() call in rcu_free_wq() (git-fixes).
- xen/pvcalls-back: test for errors when calling backend_connect() (bsc#1065600).
- xfrm: fix a warning in xfrm_policy_insert_list (bsc#1174645).
- xfrm: policy: match with both mark and mask on user interfaces (bsc#1174645).
- xfs: do not eat an EIO/ENOSPC writeback error when scrubbing data fork (git-fixes).
- xfs: fix inode allocation block res calculation precedence (git-fixes).
- xfs: fix reflink quota reservation accounting error (git-fixes).
- xfs: preserve rmapbt swapext block reservation from freed blocks (git-fixes).
Patchnames
openSUSE-2020-1236
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.\n\nThis update is signed with the new UEFI signing key for openSUSE. It contains rebuilds of all available KMP packages also rebuilt\nwith the new UEFi signing key. (boo#1174543)\n\nThe following security bugs were fixed:\n\n- CVE-2020-14356: A use after free vulnerability in cgroup BPF component was fixed (bsc#1175213).\n- CVE-2020-14331: A buffer over write in vgacon_scroll was fixed (bnc#1174205).\n- CVE-2020-16166: The Linux kernel allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c (bnc#1174757).\n- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n- CVE-2020-10781: zram sysfs resource consumption was fixed (bnc#1173074).\n\nThe following non-security bugs were fixed:\n\n- 9p/trans_fd: Fix concurrency del of req_list in p9_fd_cancelled/p9_read_work (git-fixes).\n- ACPICA: Dispatcher: add status checks (git-fixes).\n- ACPI/IORT: Fix PMCG node single ID mapping handling (git-fixes).\n- ACPI: video: Use native backlight on Acer Aspire 5783z (git-fixes).\n- ACPI: video: Use native backlight on Acer TravelMate 5735Z (git-fixes).\n- af_key: pfkey_dump needs parameter validation (git-fixes).\n- agp/intel: Fix a memory leak on module initialisation failure (git-fixes).\n- ALSA: asihpi: delete duplicated word (git-fixes).\n- ALSA: atmel: Remove invalid \u0027fall through\u0027 comments (git-fixes).\n- ALSA: core: pcm_iec958: fix kernel-doc (git-fixes).\n- ALSA: echoaduio: Drop superfluous volatile modifier (git-fixes).\n- ALSA: echoaudio: Address bugs in the interrupt handling (git-fixes).\n- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (git-fixes).\n- ALSA: echoaudio: Prevent races in calls to set_audio_format() (git-fixes).\n- ALSA: echoaudio: Prevent some noise on unloading the module (git-fixes).\n- ALSA: echoaudio: Race conditions around \u0027opencount\u0027 (git-fixes).\n- ALSA: echoaudio: re-enable IRQs on failure path (git-fixes).\n- ALSA: echoaudio: Remove redundant check (git-fixes).\n- ALSA: firewire: fix kernel-doc (git-fixes).\n- ALSA: hda: Add support for Loongson 7A1000 controller (git-fixes).\n- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (git-fixes).\n- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (git-fixes).\n- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (git-fixes).\n- ALSA: hda: Enable sync-write operation as default for all controllers (git-fixes).\n- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).\n- ALSA: hda: fix snd_hda_codec_cleanup() documentation (git-fixes).\n- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (git-fixes).\n- ALSA: hda/hdmi: Add quirk to force connectivity (git-fixes).\n- ALSA: hda/hdmi: Fix keep_power assignment for non-component devices (git-fixes).\n- ALSA: hda/hdmi: Use force connectivity quirk on another HP desktop (git-fixes).\n- ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H and EKL (jsc#SLE-13261).\n- ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H and EKL (jsc#SLE-13261).\n- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (git-fixes).\n- ALSA: hda/realtek - change to suitable link model for ASUS platform (git-fixes).\n- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (git-fixes).\n- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (git-fixes).\n- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (git-fixes).\n- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (git-fixes).\n- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (git-fixes).\n- ALSA: hda/realtek: Fix add a \u0027ultra_low_power\u0027 function for intel reference board (alc256) (git-fixes).\n- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (git-fixes).\n- ALSA: hda/realtek - Fixed HP right speaker no sound (git-fixes).\n- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (git-fixes).\n- ALSA: hda/realtek - Fix unused variable warning (git-fixes).\n- ALSA: hda/realtek - fixup for yet another Intel reference board (git-fixes).\n- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (git-fixes).\n- ALSA: hda - reverse the setting value in the micmute_led_set (git-fixes).\n- ALSA: hda/tegra: Disable sync-write operation (git-fixes).\n- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).\n- ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).\n- ALSA: isa: delete repeated words in comments (git-fixes).\n- ALSA: isa/gus: remove \u0027set but not used\u0027 warning (git-fixes).\n- ALSA: isa/gus: remove -Wmissing-prototypes warnings (git-fixes).\n- ALSA: line6: add hw monitor volume control for POD HD500 (git-fixes).\n- ALSA: line6: Perform sanity check for each URB creation (git-fixes).\n- ALSA: line6: Sync the pending work cancel at disconnection (git-fixes).\n- ALSA: line6: Use kmemdup in podhd_set_monitor_level() (git-fixes).\n- ALSA: pci/asihpi: fix kernel-doc (git-fixes).\n- ALSA: pci/asihpi: remove \u0027set but not used\u0027 warning (git-fixes).\n- ALSA: pci/asihpi: remove \u0027set but not used\u0027 warnings (git-fixes).\n- ALSA: pci/au88x0: remove \u0027defined but not used\u0027 warnings (git-fixes).\n- ALSA: pci/aw2-saa7146: remove \u0027set but not used\u0027 warning (git-fixes).\n- ALSA: pci/ctxfi/ctatc: fix kernel-doc (git-fixes).\n- ALSA: pci/ctxfi: fix kernel-doc warnings (git-fixes).\n- ALSA: pci: delete repeated words in comments (git-fixes).\n- ALSA: pci/echoaudio: remove \u0027set but not used\u0027 warning (git-fixes).\n- ALSA: pci/emu10k1: remove \u0027set but not used\u0027 warning (git-fixes).\n- ALSA: pci/es1938: remove \u0027set but not used\u0027 warning (git-fixes).\n- ALSA: pci/fm801: fix kernel-doc (git-fixes).\n- ALSA: pci/korg1212: remove \u0027set but not used\u0027 warnings (git-fixes).\n- ALSA: pci/oxygen/xonar_wm87x6: remove always true condition (git-fixes).\n- ALSA: pci/rme9652/hdspm: remove always true condition (git-fixes).\n- ALSA: pci/via82xx: remove \u0027set but not used\u0027 warnings (git-fixes).\n- ALSA: pcmcia/pdaudiocf: fix kernel-doc (git-fixes).\n- ALSA: seq: oss: Serialize ioctls (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for SSL2 (git-fixes).\n- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (git-fixes).\n- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).\n- ALSA: usb-audio: add startech usb audio dock name (git-fixes).\n- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (git-fixes).\n- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (git-fixes).\n- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (git-fixes).\n- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (git-fixes).\n- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).\n- ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).\n- ALSA: usb-audio: Fix some typos (git-fixes).\n- ALSA: usb-audio: fix spelling mistake \u0027buss\u0027 -\u003e \u0027bus\u0027 (git-fixes).\n- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (git-fixes).\n- ALSA: usb/line6: remove \u0027defined but not used\u0027 warning (git-fixes).\n- ALSA: vx_core: remove warning for empty loop body (git-fixes).\n- ALSA: xen: remove \u0027set but not used\u0027 warning (git-fixes).\n- ALSA: xen: Remove superfluous fall through comments (git-fixes).\n- apparmor: ensure that dfa state tables have entries (git-fixes).\n- apparmor: fix introspection of of task mode for unconfined tasks (git-fixes).\n- apparmor: Fix memory leak of profile proxy (git-fixes).\n- apparmor: Fix use-after-free in aa_audit_rule_init (git-fixes).\n- apparmor: remove useless aafs_create_symlink (git-fixes).\n- appletalk: Fix atalk_proc_init() return path (git-fixes).\n- arm64: armv8_deprecated: Fix undef_hook mask for thumb setend (bsc#1175180).\n- arm64: cacheflush: Fix KGDB trap detection (bsc#1175188).\n- arm64: csum: Fix handling of bad packets (bsc#1175192).\n- arm64: dts: allwinner: a64: Remove unused SPDIF sound card (none bsc#1175016).\n- arm64: dts: clearfog-gt-8k: set gigabit PHY reset deassert delay (bsc#1175347).\n- arm64: dts: exynos: Fix silent hang after boot on Espresso (bsc#1175346).\n- arm64: dts: imx8mm-evk: correct ldo1/ldo2 voltage range (none bsc#1175019).\n- arm64: dts: imx8qxp-mek: Remove unexisting Ethernet PHY (bsc#1175345).\n- arm64: dts: librem5-devkit: add a vbus supply to usb0 (none bsc#1175013).\n- arm64: dts: ls1028a: delete extraneous #interrupt-cells for ENETC RCIE (none bsc#1175012).\n- arm64: dts: ls1043a-rdb: correct RGMII delay mode to rgmii-id (bsc#1174398).\n- arm64: dts: ls1046ardb: set RGMII interfaces to RGMII_ID mode (bsc#1174398).\n- arm64: dts: qcom: msm8998-clamshell: Fix label on l15 regulator (git-fixes).\n- arm64: dts: rockchip: fix rk3399-puma gmac reset gpio (none bsc#1175021).\n- arm64: dts: rockchip: fix rk3399-puma vcc5v0-host gpio (none bsc#1175020).\n- arm64: dts: rockchip: Rename dwc3 device nodes on rk3399 to make dtc happy (none bsc#1175015).\n- arm64: dts: rockchip: Replace RK805 PMIC node name with \u0027pmic\u0027 on rk3328 boards (none bsc#1175014).\n- arm64: dts: uDPU: fix broken ethernet (bsc#1175344).\n- arm64: dts: uniphier: Set SCSSI clock and reset IDs for each channel (none bsc#1175011).\n- arm64: errata: use arm_smccc_1_1_get_conduit() (bsc#1174906).\n- arm64: Fix PTRACE_SYSEMU semantics (bsc#1175185).\n- arm64: fix the flush_icache_range arguments in machine_kexec (bsc#1175184).\n- arm64: hugetlb: avoid potential NULL dereference (bsc#1175183).\n- arm64: hw_breakpoint: Do not invoke overflow handler on uaccess watchpoints (bsc#1175189).\n- arm64: insn: Fix two bugs in encoding 32-bit logical immediates (bsc#1175186).\n- arm64: kexec_file: print appropriate variable (bsc#1175187).\n- arm64: kgdb: Fix single-step exception handling oops (bsc#1175191).\n- arm64: Retrieve stolen time as paravirtualized guest (bsc#1172197 jsc#SLE-13593).\n- arm64: Retrieve stolen time as paravirtualized guest (bsc#1172197 jsc#SLE-13593).\n- arm64: tegra: Enable I2C controller for EEPROM (none bsc#1175010).\n- arm64: tegra: Fix ethernet phy-mode for Jetson Xavier (none bsc#1175017).\n- arm64: tegra: Fix flag for 64-bit resources in \u0027ranges\u0027 property (none bsc#1175018).\n- arm64: tegra: Fix Tegra194 PCIe compatible string (none bsc#1175009).\n- arm64: vdso: Add -fasynchronous-unwind-tables to cflags (bsc#1175182).\n- arm64: vdso: do not free unallocated pages (bsc#1175181).\n- arm/arm64: Make use of the SMCCC 1.1 wrapper (bsc#1174906).\n- arm/arm64: Provide a wrapper for SMCCC 1.1 calls (bsc#1174906).\n- arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit() (bsc#1174906).\n- ARM: percpu.h: fix build error (git-fixes).\n- arm: spectre-v2: use arm_smccc_1_1_get_conduit() (bsc#1174906).\n- ASoC: codecs: max98373: Removed superfluous volume control from chip default (git-fixes).\n- ASoc: codecs: max98373: remove Idle_bias_on to let codec suspend (git-fixes).\n- ASoC: fsl_sai: Fix value of FSL_SAI_CR1_RFW_MASK (git-fixes).\n- ASoC: hdac_hda: fix deadlock after PCM open error (git-fixes).\n- ASoC: Intel: bxt_rt298: add missing .owner field (git-fixes).\n- ASoC: Intel: bytcht_es8316: Add missed put_device() (git-fixes).\n- ASoC: meson: axg-tdmin: fix g12a skew (git-fixes).\n- ASoC: meson: axg-tdm-interface: fix link fmt setup (git-fixes).\n- ASoC: meson: fixes the missed kfree() for axg_card_add_tdm_loopback (git-fixes).\n- ASoC: rockchip: add format and rate constraints on rk3399 (git-fixes).\n- ASoC: rt286: fix unexpected interrupt happens (git-fixes).\n- ASoC: rt5670: Add new gpio1_is_ext_spk_en quirk and enable it on the Lenovo Miix 2 10 (git-fixes).\n- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).\n- ASoC: rt5670: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).\n- ASoC: rt5682: Report the button event in the headset type only (git-fixes).\n- ASoC: SOF: nocodec: add missing .owner field (git-fixes).\n- ASoC: topology: fix kernel oops on route addition error (git-fixes).\n- ASoC: topology: fix tlvs in error handling for widget_dmixer (git-fixes).\n- ASoC: wm8974: fix Boost Mixer Aux Switch (git-fixes).\n- ASoC: wm8974: remove unsupported clock mode (git-fixes).\n- ath10k: Acquire tx_lock in tx error paths (git-fixes).\n- ath10k: enable transmit data ack RSSI for QCA9884 (git-fixes).\n- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).\n- ath9k: Fix regression with Atheros 9271 (git-fixes).\n- atm: fix atm_dev refcnt leaks in atmtcp_remove_persistent (git-fixes).\n- AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).\n- AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).\n- AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).\n- ax88172a: fix ax88172a_unbind() failures (git-fixes).\n- b43: Remove uninitialized_var() usage (git-fixes).\n- blk-mq: consider non-idle request as \u0027inflight\u0027 in blk_mq_rq_inflight() (bsc#1165933).\n- Bluetooth: btmtksdio: fix up firmware download sequence (git-fixes).\n- Bluetooth: btusb: fix up firmware download sequence (git-fixes).\n- Bluetooth: fix kernel oops in store_pending_adv_report (git-fixes).\n- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (git-fixes).\n- Bluetooth: Fix update of connection state in `hci_encrypt_cfm` (git-fixes).\n- Bluetooth: hci_h5: Set HCI_UART_RESET_ON_INIT to correct flags (git-fixes).\n- Bluetooth: hci_serdev: Only unregister device if it was registered (git-fixes).\n- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (git-fixes).\n- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (git-fixes).\n- bnxt_en: Init ethtool link settings after reading updated PHY configuration (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Init ethtool link settings after reading updated PHY configuration (jsc#SLE-8371 bsc#1153274).\n- bpf: Do not allow btf_ctx_access with __int128 types (bsc#1155518).\n- bpf: Fix map leak in HASH_OF_MAPS map (bsc#1155518).\n- bpfilter: fix up a sparse annotation (bsc#1155518).\n- bpfilter: Initialize pos variable (bsc#1155518).\n- bpfilter: reject kernel addresses (bsc#1155518).\n- bpfilter: switch to kernel_write (bsc#1155518).\n- bpf: net: Avoid copying sk_user_data of reuseport_array during sk_clone (bsc#1155518).\n- bpf: net: Avoid incorrect bpf_sk_reuseport_detach call (bsc#1155518).\n- brcmfmac: Set timeout value when configuring power save (bsc#1173468).\n- brcmfmac: Transform compatible string for FW loading (bsc#1169771).\n- bridge: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).\n- bridge: mcast: Fix MLD2 Report IPv6 payload length check (git-fixes).\n- btmrvl: Fix firmware filename for sd8977 chipset (git-fixes).\n- btmrvl: Fix firmware filename for sd8997 chipset (git-fixes).\n- btrfs: add assertions for tree == inode-\u003eio_tree to extent IO helpers (bsc#1174438).\n- btrfs: avoid unnecessary splits when setting bits on an extent io tree (bsc#1175377).\n- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).\n- btrfs: delete the ordered isize update code (bsc#1175377).\n- btrfs: do not set path-\u003eleave_spinning for truncate (bsc#1175377).\n- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).\n- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).\n- btrfs: fix block group leak when removing fails (bsc#1175149).\n- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).\n- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).\n- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).\n- btrfs: fix deadlock during fast fsync when logging prealloc extents beyond eof (bsc#1175377).\n- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).\n- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).\n- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).\n- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).\n- btrfs: fix lost i_size update after cloning inline extent (bsc#1175377).\n- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).\n- btrfs: fix race between block group removal and block group creation (bsc#1175149).\n- btrfs: fix race between shrinking truncate and fiemap (bsc#1175377).\n- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).\n- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).\n- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).\n- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).\n- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).\n- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).\n- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).\n- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).\n- btrfs: introduce per-inode file extent tree (bsc#1175377).\n- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).\n- btrfs: move extent_io_tree defs to their own header (bsc#1175377).\n- btrfs: Move free_pages_out label in inline extent handling branch in compress_file_range (bsc#1175263).\n- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).\n- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).\n- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).\n- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).\n- btrfs: Remove delalloc_end argument from extent_clear_unlock_delalloc (bsc#1175149).\n- btrfs: Remove leftover of in-band dedupe (bsc#1175149).\n- btrfs: remove unnecessary delalloc mutex for inodes (bsc#1175377).\n- btrfs: Rename btrfs_join_transaction_nolock (bsc#1175377).\n- btrfs: replace all uses of btrfs_ordered_update_i_size (bsc#1175377).\n- btrfs: separate out the extent io init function (bsc#1175377).\n- btrfs: separate out the extent leak code (bsc#1175377).\n- btrfs: trim: fix underflow in trim length to prevent access beyond device boundary (bsc#1175263).\n- btrfs: use btrfs_ordered_update_i_size in clone_finish_inode_update (bsc#1175377).\n- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).\n- btrfs: use the file extent tree infrastructure (bsc#1175377).\n- bus: ti-sysc: Do not disable on suspend for no-idle (git-fixes).\n- cfg80211: check vendor command doit pointer before use (git-fixes).\n- clk: actions: Fix h_clk for Actions S500 SoC (git-fixes).\n- clk: at91: clk-generated: check best_rate against ranges (git-fixes).\n- clk: at91: clk-generated: continue if __clk_determine_rate() returns error (git-fixes).\n- clk: at91: sam9x60: fix main rc oscillator frequency (git-fixes).\n- clk: at91: sam9x60-pll: check fcore against ranges (git-fixes).\n- clk: at91: sam9x60-pll: use logical or for range check (git-fixes).\n- clk: at91: sckc: register slow_rc with accuracy option (git-fixes).\n- clk: bcm2835: Do not use prediv with bcm2711\u0027s PLLs (bsc#1174865).\n- clk: bcm63xx-gate: fix last clock availability (git-fixes).\n- clk: clk-atlas6: fix return value check in atlas6_clk_init() (git-fixes).\n- clk: iproc: round clock rate to the closest (git-fixes).\n- clk: qcom: gcc-sdm660: Add missing modem reset (git-fixes).\n- clk: qcom: gcc-sdm660: Fix up gcc_mss_mnoc_bimc_axi_clk (git-fixes).\n- clk: rockchip: Revert \u0027fix wrong mmc sample phase shift for rk3328\u0027 (git-fixes).\n- clk: scmi: Fix min and max rate when registering clocks with discrete rates (git-fixes).\n- clk: spear: Remove uninitialized_var() usage (git-fixes).\n- clk: st: Remove uninitialized_var() usage (git-fixes).\n- console: newport_con: fix an issue about leak related system resources (git-fixes).\n- crc-t10dif: Fix potential crypto notify dead-lock (git-fixes).\n- crypto: caam - Fix argument type in handle_imx6_err005766 (git-fixes).\n- crypto: ccp - Fix use of merged scatterlists (git-fixes).\n- crypto: ccree - fix resource leak on error path (git-fixes).\n- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).\n- crypto: hisilicon - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).\n- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).\n- dccp: Fix possible memleak in dccp_init and dccp_fini (networking-stable-20_06_16).\n- Delete patches.suse/apparmor-Fix-memory-leak-of-profile-proxy.patch (bsc#1174627)\n- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).\n- devlink: ignore -EOPNOTSUPP errors on dumpit (bsc#1154353).\n- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).\n- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).\n- devres: keep both device name and resource name in pretty name (git-fixes).\n- dlm: remove BUG() before panic() (git-fixes).\n- dmaengine: dmatest: stop completed threads when running without set channel (git-fixes).\n- dmaengine: dw: Initialize channel before each transfer (git-fixes).\n- dmaengine: fsl-edma-common: correct DSIZE_32BYTE (git-fixes).\n- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).\n- dmaengine: fsl-edma: fix wrong tcd endianness for big-endian cpu (git-fixes).\n- dmaengine: imx-sdma: Fix: Remove \u0027always true\u0027 comparison (git-fixes).\n- dmaengine: ioat setting ioat timeout as module parameter (git-fixes).\n- dmaengine: mcf-edma: Fix NULL pointer exception in mcf_edma_tx_handler (git-fixes).\n- dmaengine: sh: usb-dmac: set tx_result parameters (git-fixes).\n- dmaengine: tegra210-adma: Fix runtime PM imbalance on error (git-fixes).\n- dm: do not use waitqueue for request-based DM (bsc#1165933).\n- docs: fix memory.low description in cgroup-v2.rst (git-fixes). (SLE documentation might refer to cgroup-v2.rst.)\n- dpaa_eth: FMan erratum A050385 workaround (bsc#1174396).\n- dpaa_eth: Make dpaa_a050385_wa static (bsc#1174396).\n- drbd: Remove uninitialized_var() usage (git-fixes).\n- driver core: Avoid binding drivers to dead devices (git-fixes).\n- drivers/firmware/psci: Fix memory leakage in alloc_init_cpu_groups() (git-fixes).\n- drivers/net/wan: lapb: Corrected the usage of skb_cow (git-fixes).\n- drm/amd/display: Clear dm_state for fast updates (git-fixes).\n- drm/amd/display: Use kfree() to free rgb_user in calculate_user_regamma_ramp() (git-fixes).\n- drm/amdgpu/atomfirmware: fix vram_info fetching for renoir (git-fixes).\n- drm/amdgpu/display: use blanked rather than plane state for sync (bsc#1152489) \t* refreshed for context changes \t* protect code with CONFIG_DRM_AMD_DC_DCN2_0\n- drm/amdgpu: do not do soft recovery if gpu_recovery=0 (git-fixes).\n- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (git-fixes).\n- drm/amdgpu: fix preemption unit test (git-fixes).\n- drm/amdgpu/gfx10: fix race condition for kiq (git-fixes).\n- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).\n- drm/amdgpu/sdma5: fix wptr overwritten in -\u003eget_wptr() (git-fixes).\n- drm/amdgpu: use %u rather than %d for sclk/mclk (git-fixes).\n- drm/amd/powerplay: fix a crash when overclocking Vega M (bsc#1152472)\n- drm/amd/powerplay: fix a crash when overclocking Vega M (git-fixes).\n- drm/arm: fix unintentional integer overflow on left shift (git-fixes).\n- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1152472) \t* refreshed for context changes\n- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).\n- drm/bridge: ti-sn65dsi86: Clear old error bits before AUX transfers (git-fixes).\n- drm/bridge: ti-sn65dsi86: Do not use kernel-doc comment for local array (git-fixes).\n- drm/bridge: ti-sn65dsi86: Fix off-by-one error in clock choice (bsc#1152489) \t* refreshed for context changes\n- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1152472) \t* move drm_mipi_dbi.c -\u003e tinydrm/mipi-dbi.c\n- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).\n- drm/exynos: fix ref count leak in mic_pre_enable (git-fixes).\n- drm/exynos: Properly propagate return value in drm_iommu_attach_device() (git-fixes).\n- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (git-fixes).\n- drm/gem: Fix a leak in drm_gem_objects_lookup() (git-fixes).\n- drm: hold gem reference until object is no longer accessed (git-fixes).\n- drm/i915: Actually emit the await_start (bsc#1174737).\n- drm/i915: Copy across scheduler behaviour flags across submit fences (bsc#1174737).\n- drm/i915: Do not poison i915_request.link on removal (bsc#1174737).\n- drm/i915: Drop no-semaphore boosting (bsc#1174737).\n- drm/i915: Eliminate the trylock for awaiting an earlier request (bsc#1174737).\n- drm/i915/fbc: Fix fence_y_offset handling (bsc#1152489) \t* context changes\n- drm/i915: Flush execution tasklets before checking request status (bsc#1174737).\n- drm/i915: Flush tasklet submission before sleeping on i915_request_wait (bsc#1174737).\n- drm/i915/gt: Close race between engine_park and intel_gt_retire_requests (git-fixes).\n- drm/i915/gt: Flush submission tasklet before waiting/retiring (bsc#1174737).\n- drm/i915/gt: Ignore irq enabling on the virtual engines (git-fixes).\n- drm/i915/gt: Move new timelines to the end of active_list (git-fixes).\n- drm/i915/gt: Only swap to a random sibling once upon creation (bsc#1152489) \t* context changes\n- drm/i915/gt: Unlock engine-pm after queuing the kernel context switch (git-fixes).\n- drm/i915: Ignore submit-fences on the same timeline (bsc#1174737).\n- drm/i915: Improve the start alignment of bonded pairs (bsc#1174737).\n- drm/i915: Keep track of request among the scheduling lists (bsc#1174737).\n- drm/i915: Lock signaler timeline while navigating (bsc#1174737).\n- drm/i915: Mark i915_request.timeline as a volatile, rcu pointer (bsc#1174737).\n- drm/i915: Mark racy read of intel_engine_cs.saturated (bsc#1174737).\n- drm/i915: Mark up unlocked update of i915_request.hwsp_seqno (bsc#1174737).\n- drm/i915: Move cec_notifier to intel_hdmi_connector_unregister, v2. (bsc#1152489) \t* context changes\n- drm/i915: Peel dma-fence-chains for await (bsc#1174737).\n- drm/i915: Prevent using semaphores to chain up to external fences (bsc#1174737).\n- drm/i915: Protect i915_request_await_start from early waits (bsc#1174737).\n- drm/i915: Pull waiting on an external dma-fence into its routine (bsc#1174737).\n- drm/i915: Rely on direct submission to the queue (bsc#1174737).\n- drm/i915: Remove wait priority boosting (bsc#1174737).\n- drm/i915: Reorder await_execution before await_request (bsc#1174737).\n- drm/i915: Return early for await_start on same timeline (bsc#1174737).\n- drm/i915: Use EAGAIN for trylock failures (bsc#1174737).\n- drm/imx: fix use after free (git-fixes).\n- drm/imx: imx-ldb: Disable both channels for split mode in enc-\u003edisable() (git-fixes).\n- drm/imx: tve: fix regulator_disable error path (git-fixes).\n- drm/ingenic: Fix incorrect assumption about plane-\u003eindex (bsc#1152489) \t* refreshed for context changes\n- drm: mcde: Fix display initialization problem (git-fixes).\n- drm/mediatek: Check plane visibility in atomic_update (git-fixes).\n- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).\n- drm/msm/dpu: allow initialization of encoder locks during encoder init (git-fixes).\n- drm/msm: fix potential memleak in error branch (git-fixes).\n- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).\n- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).\n- drm/nouveau/i2c/g94-: increase NV_PMGR_DP_AUXCTL_TRANSACTREQ timeout (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (git-fixes).\n- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (git-fixes).\n- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).\n- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).\n- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).\n- drm/radeon: fix double free (git-fixes).\n- drm/stm: repair runtime power management (git-fixes).\n- drm: sun4i: hdmi: Fix inverted HPD result (git-fixes).\n- drm/sun4i: tcon: Separate quirks for tcon0 and tcon1 on A20 (git-fixes).\n- drm/tegra: hub: Do not enable orphaned window group (git-fixes).\n- drm/vgem: Replace opencoded version of drm_gem_dumb_map_offset() (bsc#1152489) \t* refreshed for context changes\n- drm/vmwgfx: Fix two list_for_each loop exit tests (git-fixes).\n- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (git-fixes).\n- exfat: add missing brelse() calls on error paths (git-fixes).\n- exfat: fix incorrect update of stream entry in __exfat_truncate() (git-fixes).\n- exfat: fix memory leak in exfat_parse_param() (git-fixes).\n- exfat: move setting VOL_DIRTY over exfat_remove_entries() (git-fixes).\n- fbdev: Detect integer underflow at \u0027struct fbcon_ops\u0027-\u003eclear_margins (git-fixes).\n- firmware: arm_scmi: Fix SCMI genpd domain probing (git-fixes).\n- firmware: arm_scmi: Keep the discrete clock rates sorted (git-fixes).\n- firmware: arm_sdei: use common SMCCC_CONDUIT_* (bsc#1174906).\n- firmware: Fix a reference count leak (git-fixes).\n- firmware_loader: fix memory leak for paged buffer (bsc#1175367).\n- firmware/psci: use common SMCCC_CONDUIT_* (bsc#1174906).\n- firmware: smccc: Add ARCH_SOC_ID support (bsc#1174906).\n- firmware: smccc: Add function to fetch SMCCC version (bsc#1174906).\n- firmware: smccc: Add HAVE_ARM_SMCCC_DISCOVERY to identify SMCCC v1.1 and above (bsc#1174906).\n- firmware: smccc: Add the definition for SMCCCv1.2 version/error codes (bsc#1174906).\n- firmware: smccc: Drop smccc_version enum and use ARM_SMCCC_VERSION_1_x instead (bsc#1174906).\n- firmware: smccc: Refactor SMCCC specific bits into separate file (bsc#1174906).\n- firmware: smccc: Update link to latest SMCCC specification (bsc#1174906).\n- fpga: dfl: fix bug in port reset handshake (git-fixes).\n- fsl/fman: detect FMan erratum A050385 (bsc#1174396) Update arm64 config file\n- fuse: copy_file_range should truncate cache (git-fixes).\n- fuse: fix copy_file_range cache issues (git-fixes).\n- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175176).\n- fuse: fix weird page warning (bsc#1175175).\n- geneve: fix an uninitialized value in geneve_changelink() (git-fixes).\n- genirq/affinity: Improve __irq_build_affinity_masks() (bsc#1174897 ltc#187090).\n- genirq/affinity: Remove const qualifier from node_to_cpumask argument (bsc#1174897 ltc#187090).\n- genirq/affinity: Spread vectors on node according to nr_cpu ratio (bsc#1174897 ltc#187090).\n- gfs2: Another gfs2_find_jhead fix (bsc#1174824).\n- gfs2: fix gfs2_find_jhead that returns uninitialized jhead with seq 0 (bsc#1174825).\n- go7007: add sanity checking for endpoints (git-fixes).\n- gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).\n- gpio: arizona: put pm_runtime in case of failure (git-fixes).\n- gpio: max77620: Fix missing release of interrupt (git-fixes).\n- gpio: pca953x: disable regmap locking for automatic address incrementing (git-fixes).\n- gpio: pca953x: Fix GPIO resource leak on Intel Galileo Gen 2 (git-fixes).\n- gpio: pca953x: Override IRQ for one of the expanders on Galileo Gen 2 (git-fixes).\n- gpu: host1x: Detach driver on unregister (git-fixes).\n- habanalabs: increase timeout during reset (git-fixes).\n- HID: alps: support devices with report id 2 (git-fixes).\n- HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).\n- HID: i2c-hid: add Mediacom FlexBook edge13 to descriptor override (git-fixes).\n- HID: logitech-hidpp: avoid repeated \u0027multiplier = \u0027 log messages (git-fixes).\n- HID: magicmouse: do not set up autorepeat (git-fixes).\n- HID: quirks: Always poll Obins Anne Pro 2 keyboard (git-fixes).\n- HID: quirks: Ignore Simply Automated UPB PIM (git-fixes).\n- HID: quirks: Remove ITE 8595 entry from hid_have_special_driver (git-fixes).\n- HID: steam: fixes race in handling device list (git-fixes).\n- hippi: Fix a size used in a \u0027pci_free_consistent()\u0027 in an error handling path (git-fixes).\n- hwmon: (adm1275) Make sure we are reading enough data for different chips (git-fixes).\n- hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).\n- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (git-fixes).\n- hwmon: (nct6775) Accept PECI Calibration as temperature source for NCT6798D (git-fixes).\n- hwmon: (scmi) Fix potential buffer overflow in scmi_hwmon_probe() (git-fixes).\n- hwrng: ks-sa - Fix runtime PM imbalance on error (git-fixes).\n- i2c: also convert placeholder function to return errno (git-fixes).\n- i2c: eg20t: Load module automatically if ID matches (git-fixes).\n- i2c: i2c-qcom-geni: Fix DMA transfer race (git-fixes).\n- i2c: iproc: fix race between client unreg and isr (git-fixes).\n- i2c: rcar: always clear ICSAR to avoid side effects (git-fixes).\n- i2c: rcar: avoid race when unregistering slave (git-fixes).\n- i2c: rcar: slave: only send STOP event when we have been addressed (git-fixes).\n- i2c: slave: add sanity check when unregistering (git-fixes).\n- i2c: slave: improve sanity check when registering (git-fixes).\n- i40iw: Do an RCU lookup in i40iw_add_ipv4_addr (git-fixes).\n- i40iw: Fix error handling in i40iw_manage_arp_cache() (git-fixes).\n- i40iw: fix null pointer dereference on a null wqe pointer (git-fixes).\n- i40iw: Report correct firmware version (git-fixes).\n- IB/cma: Fix ports memory leak in cma_configfs (git-fixes).\n- IB/core: Fix potential NULL pointer dereference in pkey cache (git-fixes).\n- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).\n- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).\n- IB/hfi1: Ensure pq is not left on waitlist (git-fixes).\n- IB/hfi1: Fix another case where pq is left on waitlist (bsc#1174411).\n- IB/hfi1: Fix memory leaks in sysfs registration and unregistration (git-fixes).\n- IB/hfi1: Fix module use count flaw due to leftover module put calls (bsc#1174407).\n- IB/hfi1, qib: Ensure RCU is locked when accessing list (git-fixes).\n- IB/ipoib: Fix double free of skb in case of multicast traffic in CM mode (git-fixes).\n- IB/mad: Fix use after free when destroying MAD agent (git-fixes).\n- IB/mlx4: Test return value of calls to ib_get_cached_pkey (git-fixes).\n- IB/mlx5: Fix 50G per lane indication (git-fixes).\n- IB/mlx5: Fix DEVX support for MLX5_CMD_OP_INIT2INIT_QP command (git-fixes).\n- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (git-fixes).\n- IB/mlx5: Replace tunnel mpls capability bits for tunnel_offloads (git-fixes).\n- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).\n- IB/qib: Call kobject_put() when kobject_init_and_add() fails (git-fixes).\n- IB/rdmavt: Always return ERR_PTR from rvt_create_mmap_info() (git-fixes).\n- IB/rdmavt: Delete unused routine (git-fixes).\n- IB/rdmavt: Fix RQ counting issues causing use of an invalid RWQE (bsc#1174770).\n- IB/sa: Resolv use-after-free in ib_nl_make_request() (git-fixes).\n- ide: Remove uninitialized_var() usage (git-fixes).\n- ieee802154: fix one possible memleak in adf7242_probe (git-fixes).\n- iio: adc: ad7780: Fix a resource handling path in \u0027ad7780_probe()\u0027 (git-fixes).\n- iio: core: add missing IIO_MOD_H2/ETHANOL string identifiers (git-fixes).\n- iio:health:afe4404 Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:humidity:hdc100x Fix alignment and data leak issues (git-fixes).\n- iio:humidity:hts221 Fix alignment and data leak issues (git-fixes).\n- iio: improve IIO_CONCENTRATION channel type description (git-fixes).\n- iio:magnetometer:ak8974: Fix alignment and data leak issues (git-fixes).\n- iio: magnetometer: ak8974: Fix runtime PM imbalance on error (git-fixes).\n- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (git-fixes).\n- iio:pressure:ms5611 Fix buffer element alignment (git-fixes).\n- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (git-fixes).\n- Input: elan_i2c - add more hardware ID for Lenovo laptops (git-fixes).\n- Input: elan_i2c - only increment wakeup count on touch (git-fixes).\n- Input: goodix - fix touch coordinates on Cube I15-TC (git-fixes).\n- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (git-fixes).\n- Input: mms114 - add extra compatible for mms345l (git-fixes).\n- Input: sentelic - fix error return when fsp_reg_write fails (git-fixes).\n- Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).\n- integrity: remove redundant initialization of variable ret (git-fixes).\n- intel_th: Fix a NULL dereference when hub driver is not loaded (git-fixes).\n- intel_th: pci: Add Emmitsburg PCH support (git-fixes).\n- intel_th: pci: Add Jasper Lake CPU support (git-fixes).\n- intel_th: pci: Add Tiger Lake PCH-H support (git-fixes).\n- io-mapping: indicate mapping failure (git-fixes).\n- iommu/arm-smmu-v3: Do not reserve implementation defined register space (bsc#1174126).\n- iommu/vt-d: Enable PCI ACS for platform opt in hint (bsc#1174127).\n- iommu/vt-d: Update scalable mode paging structure coherency (bsc#1174128).\n- ionic: centralize queue reset code (bsc#1167773).\n- ionic: fix up filter locks and debug msgs (bsc#1167773).\n- ionic: keep rss hash after fw update (bsc#1167773).\n- ionic: unlock queue mutex in error path (bsc#1167773).\n- ionic: update filter id after replay (bsc#1167773).\n- ionic: update the queue count on open (bsc#1167773).\n- ionic: use mutex to protect queue operations (bsc#1167773).\n- ionic: use offset for ethtool regs data (bsc#1167773).\n- irqchip/gic: Atomically update affinity (bsc#1175195).\n- kabi fix for SUNRPC-dont-update-timeout-value-on-connection-reset.patch (bsc1174263).\n- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).\n- kABI: restore signature of xfrm_policy_bysel_ctx() and xfrm_policy_byid() (bsc#1174645).\n- kABI workaround for enum cpuhp_state (git-fixes).\n- kABI workaround for struct kvm_device (git-fixes). Just change an variable to \u0027const\u0027 type in kvm_device.\n- kABI workaround for struct kvm_vcpu_arch (git-fixes).\n- kernel.h: remove duplicate include of asm/div64.h (git-fixes).\n- keys: asymmetric: fix error return code in software_key_query() (git-fixes).\n- kobject: Avoid premature parent object freeing in kobject_cleanup() (git-fixes).\n- KVM: Allow kvm_device_ops to be const (bsc#1172197 jsc#SLE-13593).\n- KVM: Allow kvm_device_ops to be const (bsc#1172197 jsc#SLE-13593).\n- KVM: arm64: Annotate hyp NMI-related functions as __always_inline (bsc#1175190).\n- KVM: arm64: Correct PSTATE on exception entry (bsc#1133021).\n- KVM: arm64: Document PV-time interface (bsc#1172197 jsc#SLE-13593).\n- KVM: arm64: Document PV-time interface (bsc#1172197 jsc#SLE-13593).\n- KVM: arm64: Fix 32bit PC wrap-around (bsc#1133021).\n- KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197 jsc#SLE-13593).\n- KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197 jsc#SLE-13593).\n- KVM: arm64: Make vcpu_cp1x() work on Big Endian hosts (bsc#1133021).\n- KVM: arm64: Provide VCPU attributes for stolen time (bsc#1172197 jsc#SLE-13593).\n- KVM: arm64: Provide VCPU attributes for stolen time (bsc#1172197 jsc#SLE-13593).\n- KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than SCHEDSTATS (bsc#1172197 jsc#SLE-13593).\n- KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than SCHEDSTATS (bsc#1172197 jsc#SLE-13593).\n- KVM: arm64: Stop writing aarch32\u0027s CSSELR into ACTLR (bsc#1133021).\n- KVM: arm64: Support stolen time reporting via shared structure (bsc#1172197 jsc#SLE-13593).\n- KVM: arm64: Support stolen time reporting via shared structure (bsc#1172197 jsc#SLE-13593).\n- KVM: arm64: Use the correct timer structure to access the physical counter (bsc#1133021).\n- KVM: arm/arm64: Correct AArch32 SPSR on exception entry (bsc#1133021).\n- KVM: arm/arm64: Correct CPSR on exception entry (bsc#1133021).\n- KVM: arm/arm64: Factor out hypercall handling from PSCI code (bsc#1172197 jsc#SLE-13593).\n- KVM: arm/arm64: Factor out hypercall handling from PSCI code (bsc#1172197 jsc#SLE-13593).\n- KVM: arm: vgic: Fix limit condition when writing to GICD_IACTIVER (bsc#1133021).\n- KVM: Implement kvm_put_guest() (bsc#1172197 jsc#SLE-13593).\n- KVM: nVMX: always update CR3 in VMCS (git-fixes).\n- KVM: Play nice with read-only memslots when querying host page size (bsc#1133021).\n- KVM: s390: Remove false WARN_ON_ONCE for the PQAP instruction (bsc#1133021).\n- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).\n- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).\n- leds: 88pm860x: fix use-after-free on unbind (git-fixes).\n- leds: core: Flush scheduled work for system suspend (git-fixes).\n- leds: da903x: fix use-after-free on unbind (git-fixes).\n- leds: gpio: Fix semantic error (git-fixes).\n- leds: lm3533: fix use-after-free on unbind (git-fixes).\n- leds: lm355x: avoid enum conversion warning (git-fixes).\n- leds: lm36274: fix use-after-free on unbind (git-fixes).\n- leds: wm831x-status: fix use-after-free on unbind (git-fixes).\n- libbpf: Wrap source argument of BPF_CORE_READ macro in parentheses (bsc#1155518).\n- lib: Reduce user_access_begin() boundaries in strncpy_from_user() and strnlen_user() (bsc#1174331).\n- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).\n- locktorture: Print ratio of acquisitions, not failures (bsc#1149032).\n- mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).\n- mac80211: fix misplaced while instead of if (git-fixes).\n- mac80211: mesh: Free ie data when leaving mesh (git-fixes).\n- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).\n- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).\n- media: cxusb-analog: fix V4L2 dependency (git-fixes).\n- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).\n- media: firewire: Using uninitialized values in node_probe() (git-fixes).\n- media: marvell-ccic: Add missed v4l2_async_notifier_cleanup() (git-fixes).\n- media: media-request: Fix crash if memory allocation fails (git-fixes).\n- media: nuvoton-cir: remove setting tx carrier functions (git-fixes).\n- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).\n- media: sur40: Remove uninitialized_var() usage (git-fixes).\n- media: vsp1: dl: Fix NULL pointer dereference on unbind (git-fixes).\n- mei: bus: do not clean driver pointer (git-fixes).\n- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).\n- mfd: dln2: Run event handler loop under spinlock (git-fixes).\n- mfd: intel-lpss: Add Intel Jasper Lake PCI IDs (jsc#SLE-12602).\n- mlxsw: core: Fix wrong SFP EEPROM reading for upper pages 1-3 (bsc#1154488).\n- mlxsw: core: Use different get_trend() callbacks for different thermal zones (networking-stable-20_06_10).\n- mmc: meson-gx: limit segments to 1 when dram-access-quirk is needed (git-fixes).\n- mmc: sdhci: do not enable card detect interrupt for gpio cd type (git-fixes).\n- mm: Fix protection usage propagation (bsc#1174002).\n- mm/mmap.c: close race between munmap() and expand_upwards()/downwards() (bsc#1174527).\n- mtd: properly check all write ioctls for permissions (git-fixes).\n- mtd: rawnand: fsl_upm: Remove unused mtd var (git-fixes).\n- mtd: rawnand: qcom: avoid write to unavailable register (git-fixes).\n- mwifiex: Fix firmware filename for sd8977 chipset (git-fixes).\n- mwifiex: Fix firmware filename for sd8997 chipset (git-fixes).\n- mwifiex: Prevent memory corruption handling keys (git-fixes).\n- nbd: Fix memory leak in nbd_add_socket (git-fixes).\n- ndctl/papr_scm,uapi: Add support for PAPR nvdimm specific methods (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).\n- net/bpfilter: Initialize pos in __bpfilter_process_sockopt (bsc#1155518).\n- net/bpfilter: split __bpfilter_process_sockopt (bsc#1155518).\n- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).\n- netdevsim: fix unbalaced locking in nsim_create() (git-fixes).\n- net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n- net: ena: add reserved PCI device ID (bsc#1174852).\n- net: ena: add support for reporting of packet drops (bsc#1174852).\n- net: ena: add support for the rx offset feature (bsc#1174852).\n- net: ena: add support for traffic mirroring (bsc#1174852).\n- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).\n- net: ena: allow setting the hash function without changing the key (bsc#1174852).\n- net: ena: avoid memory access violation by validating req_id properly (bsc#1174852).\n- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).\n- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).\n- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).\n- net: ena: changes to RSS hash key allocation (bsc#1174852).\n- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).\n- net: ena: cosmetic: code reorderings (bsc#1174852).\n- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).\n- net: ena: cosmetic: fix line break issues (bsc#1174852).\n- net: ena: cosmetic: fix spacing issues (bsc#1174852).\n- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).\n- net: ena: cosmetic: minor code changes (bsc#1174852).\n- net: ena: cosmetic: remove unnecessary code (bsc#1174852).\n- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).\n- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).\n- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).\n- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).\n- net: ena: drop superfluous prototype (bsc#1174852).\n- net: ena: enable support of rss hash key and function changes (bsc#1174852).\n- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).\n- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).\n- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).\n- net: ena: fix continuous keep-alive resets (bsc#1174852).\n- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).\n- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).\n- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).\n- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).\n- net: ena: Make some functions static (bsc#1174852).\n- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).\n- net: ena: reduce driver load time (bsc#1174852).\n- net: ena: remove code that does nothing (bsc#1174852).\n- net: ena: remove set but not used variable \u0027hash_key\u0027 (bsc#1174852).\n- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).\n- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).\n- net: ena: support new LLQ acceleration mode (bsc#1174852).\n- net: ena: use explicit variable size for clarity (bsc#1174852).\n- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).\n- net_failover: fixed rollback in net_failover_open() (networking-stable-20_06_10).\n- netfilter: ip6tables: Add a .pre_exit hook in all ip6table_foo.c (bsc#1171857).\n- netfilter: ip6tables: Split ip6t_unregister_table() into pre_exit and exit helpers (bsc#1171857).\n- netfilter: iptables: Add a .pre_exit hook in all iptable_foo.c (bsc#1171857).\n- netfilter: iptables: Split ipt_unregister_table() into pre_exit and exit helpers (bsc#1171857).\n- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)\n- net: fsl/fman: treat all RGMII modes in memac_adjust_link() (bsc#1174398).\n- net: hns3: check reset pending after FLR prepare (bsc#1154353).\n- net: hns3: fix error handling for desc filling (git-fixes).\n- net: hns3: fix for not calculating TX BD send size correctly (git-fixes).\n- net: hns3: fix return value error when query MAC link status fail (git-fixes).\n- net: ipv4: Fix wrong type conversion from hint to rt in ip_route_use_hint() (bsc#1154353).\n- net: lan78xx: add missing endpoint sanity check (git-fixes).\n- net: lan78xx: fix transfer-buffer memory leak (git-fixes).\n- net: lan78xx: replace bogus endpoint lookup (git-fixes).\n- net: macb: call pm_runtime_put_sync on failure path (git-fixes).\n- net/mlx5: drain health workqueue in case of driver load error (networking-stable-20_06_16).\n- net/mlx5e: Fix CPU mapping after function reload to avoid aRFS RX crash (jsc#SLE-8464).\n- net/mlx5e: Fix CPU mapping after function reload to avoid aRFS RX crash (jsc#SLE-8464).\n- net/mlx5e: Fix kernel crash when setting vf VLANID on a VF dev (jsc#SLE-8464).\n- net/mlx5e: Fix kernel crash when setting vf VLANID on a VF dev (jsc#SLE-8464).\n- net/mlx5e: Fix repeated XSK usage on one channel (networking-stable-20_06_16).\n- net/mlx5e: Fix VXLAN configuration restore after function reload (jsc#SLE-8464).\n- net/mlx5e: Fix VXLAN configuration restore after function reload (jsc#SLE-8464).\n- net/mlx5: E-switch, Destroy TSAR when fail to enable the mode (jsc#SLE-8464).\n- net/mlx5: E-switch, Destroy TSAR when fail to enable the mode (jsc#SLE-8464).\n- net/mlx5: Fix fatal error handling during device load (networking-stable-20_06_16).\n- net: phy: Check harder for errors in get_phy_id() (git-fixes).\n- net: phy: fix memory leak in device-create error path (git-fixes).\n- net: phy: realtek: add support for configuring the RX delay on RTL8211F (bsc#1174398).\n- net, sk_msg: Clear sk_user_data pointer on clone if tagged (bsc#1155518).\n- net, sk_msg: Do not use RCU_INIT_POINTER on sk_user_data (bsc#1155518).\n- net/smc: fix restoring of fallback changes (git-fixes).\n- net: stmmac: do not attach interface until resume finishes (bsc#1174072).\n- net: stmmac: dwc-qos: avoid clk and reset for acpi device (bsc#1174072).\n- net: stmmac: dwc-qos: use generic device api (bsc#1174072).\n- net: stmmac: enable timestamp snapshot for required PTP packets in dwmac v5.10a (networking-stable-20_06_07).\n- net: stmmac: platform: fix probe for ACPI devices (bsc#1174072).\n- net/tls: fix encryption error checking (git-fixes).\n- net/tls: free record only on encryption error (git-fixes).\n- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).\n- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).\n- nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).\n- nfp: flower: fix used time of merge flow statistics (networking-stable-20_06_07).\n- NFS: Fix interrupted slots by sending a solo SEQUENCE operation (bsc#1174264).\n- NTB: Fix static check warning in perf_clear_test (git-fixes).\n- NTB: Fix the default port and peer numbers for legacy drivers (git-fixes).\n- ntb: hw: remove the code that sets the DMA mask (git-fixes).\n- NTB: ntb_pingpong: Choose doorbells based on port number (git-fixes).\n- NTB: ntb_test: Fix bug when counting remote files (git-fixes).\n- NTB: ntb_tool: reading the link file should not end in a NULL byte (git-fixes).\n- NTB: perf: Do not require one more memory window than number of peers (git-fixes).\n- NTB: perf: Fix race condition when run with ntb_test (git-fixes).\n- NTB: perf: Fix support for hardware that does not have port numbers (git-fixes).\n- ntb_perf: pass correct struct device to dma_alloc_coherent (git-fixes).\n- NTB: Revert the change to use the NTB device dev for DMA allocations (git-fixes).\n- ntb_tool: pass correct struct device to dma_alloc_coherent (git-fixes).\n- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n- ocfs2: fix remounting needed after setfacl command (bsc#1173954).\n- ocfs2: load global_inode_alloc (bsc#1172963).\n- omapfb: dss: Fix max fclk divider for omap36xx (git-fixes).\n- ovl: inode reference leak in ovl_is_inuse true case (git-fixes).\n- padata: add separate cpuhp node for CPUHP_PADATA_DEAD (git-fixes).\n- padata: kABI fixup for struct padata_instance splitting nodes (git-fixes).\n- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).\n- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).\n- PCI/ASPM: Add missing newline in sysfs \u0027policy\u0027 (git-fixes).\n- PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes).\n- PCI: cadence: Fix updating Vendor ID and Subsystem Vendor ID register (git-fixes).\n- PCI/EDR: Log only ACPI_NOTIFY_DISCONNECT_RECOVER events (bsc#1174513).\n- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).\n- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).\n- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201).\n- PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).\n- PCI: qcom: Add missing reset for ipq806x (git-fixes).\n- PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).\n- PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).\n- PCI: rcar: Fix runtime PM imbalance on error (git-fixes).\n- PCI: Release IVRS table in AMD ACS quirk (git-fixes).\n- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).\n- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).\n- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).\n- PCI: tegra: Revert tegra124 raw_violation_fixup (git-fixes).\n- percpu: Separate decrypted varaibles anytime encryption can be enabled (bsc#1174332).\n- phy: armada-38x: fix NETA lockup when repeatedly switching speeds (git-fixes).\n- phy: exynos5-usbdrd: Calibrating makes sense only for USB2.0 PHY (git-fixes).\n- phy: renesas: rcar-gen3-usb2: move irq registration to init (git-fixes).\n- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).\n- pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).\n- pinctrl: ingenic: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).\n- pinctrl: single: fix function name in documentation (git-fixes).\n- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).\n- platform/chrome: cros_ec_ishtp: Fix a double-unlock issue (git-fixes).\n- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).\n- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).\n- platform/x86: ISST: Increase timeout (bsc#1174185).\n- PM: wakeup: Show statistics for deleted wakeup sources again (git-fixes).\n- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).\n- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).\n- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).\n- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).\n- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).\n- powerpc: Document details on H_SCM_HEALTH hcall (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).\n- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).\n- powerpc/kasan: Fix issues by lowering KASAN_SHADOW_END (git-fixes).\n- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).\n- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).\n- powerpc/papr_scm: Add support for fetching nvdimm \u0027fuel-gauge\u0027 metric (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n- powerpc/papr_scm: Fetch nvdimm health information from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n- powerpc/papr_scm: Fetch nvdimm performance stats from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n- powerpc/papr_scm: Implement support for PAPR_PDSM_HEALTH (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n- powerpc/papr_scm: Improve error logging and handling papr_scm_ndctl() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n- powerpc/papr_scm: Mark papr_scm_ndctl() as static (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).\n- powerpc/pseries: PCIE PHB reset (bsc#1174689).\n- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).\n- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).\n- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).\n- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).\n- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).\n- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).\n- qed: suppress \u0027do not support RoCE \u0026 iWARP\u0027 flooding on HW init (git-fixes).\n- qed: suppress false-positives interrupt error messages on HW init (git-fixes).\n- r8169: fix jumbo configuration for RTL8168evl (bsc#1175296).\n- r8169: fix jumbo packet handling on resume from suspend (bsc#1175296).\n- r8169: fix resume on cable plug-in (bsc#1175296).\n- r8169: fix rtl_hw_jumbo_disable for RTL8168evl (bsc#1175296).\n- r8169: move disabling interrupt coalescing to RTL8169/RTL8168 init (bsc#1175296).\n- r8169: read common register for PCI commit (bsc#1175296).\n- random32: move the pseudo-random 32-bit definitions to prandom.h (git-fixes).\n- random32: remove net_rand_state from the latent entropy gcc plugin (git-fixes).\n- random: fix circular include dependency on arm64 after addition of percpu.h (git-fixes).\n- RDMA/cm: Add missing locking around id.state in cm_dup_req_handler (git-fixes).\n- RDMA/cma: Protect bind_list and listen_list while finding matching cm id (git-fixes).\n- RDMA/cm: Fix an error check in cm_alloc_id_priv() (git-fixes).\n- RDMA/cm: Fix checking for allowed duplicate listens (git-fixes).\n- RDMA/cm: Fix ordering of xa_alloc_cyclic() in ib_create_cm_id() (git-fixes).\n- RDMA/cm: Read id.state under lock when doing pr_debug() (git-fixes).\n- RDMA/cm: Remove a race freeing timewait_info (git-fixes).\n- RDMA/cm: Update num_paths in cma_resolve_iboe_route error flow (git-fixes).\n- RDMA/core: Fix double destruction of uobject (git-fixes).\n- RDMA/core: Fix double put of resource (git-fixes).\n- RDMA/core: Fix missing error check on dev_set_name() (git-fixes).\n- RDMA/core: Fix protection fault in ib_mr_pool_destroy (git-fixes).\n- RDMA/core: Fix race between destroy and release FD object (git-fixes).\n- RDMA/core: Fix race in rdma_alloc_commit_uobject() (git-fixes).\n- RDMA/core: Prevent mixed use of FDs between shared ufiles (git-fixes).\n- RDMA/counter: Query a counter before release (git-fixes).\n- RDMA/efa: Set maximum pkeys device attribute (git-fixes).\n- RDMA/hns: Bugfix for querying qkey (git-fixes).\n- RDMA/hns: Fix cmdq parameter of querying pf timer resource (git-fixes).\n- RDMA/iwcm: Fix iwcm work deallocation (git-fixes).\n- RDMA/iw_cxgb4: Fix incorrect function parameters (git-fixes).\n- RDMA/mad: Do not crash if the rdma device does not have a umad interface (git-fixes).\n- RDMA/mad: Fix possible memory leak in ib_mad_post_receive_mads() (git-fixes).\n- RDMA/mlx4: Initialize ib_spec on the stack (git-fixes).\n- RDMA/mlx5: Add init2init as a modify command (git-fixes).\n- RDMA/mlx5: Fix access to wrong pointer while performing flush due to error (git-fixes).\n- RDMA/mlx5: Fix prefetch memory leak if get_prefetchable_mr fails (jsc#SLE-8446).\n- RDMA/mlx5: Fix prefetch memory leak if get_prefetchable_mr fails (jsc#SLE-8446).\n- RDMA/mlx5: Fix the number of hwcounters of a dynamic counter (git-fixes).\n- RDMA/mlx5: Fix udata response upon SRQ creation (git-fixes).\n- RDMA/mlx5: Prevent prefetch from racing with implicit destruction (jsc#SLE-8446).\n- RDMA/mlx5: Prevent prefetch from racing with implicit destruction (jsc#SLE-8446).\n- RDMA/mlx5: Set GRH fields in query QP on RoCE (git-fixes).\n- RDMA/mlx5: Use xa_lock_irq when access to SRQ table (git-fixes).\n- RDMA/mlx5: Verify that QP is created with RQ or SQ (git-fixes).\n- RDMA/nldev: Fix crash when set a QP to a new counter but QPN is missing (git-fixes).\n- RDMA/pvrdma: Fix missing pci disable in pvrdma_pci_probe() (git-fixes).\n- RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (git-fixes).\n- RDMA/rvt: Fix potential memory leak caused by rvt_alloc_rq (git-fixes).\n- RDMA/rxe: Always return ERR_PTR from rxe_create_mmap_info() (git-fixes).\n- RDMA/rxe: Fix configuration of atomic queue pair attributes (git-fixes).\n- RDMA/rxe: Set default vendor ID (git-fixes).\n- RDMA/rxe: Set sys_image_guid to be aligned with HW IB devices (git-fixes).\n- RDMA/siw: Fix failure handling during device creation (git-fixes).\n- RDMA/siw: Fix passive connection establishment (git-fixes).\n- RDMA/siw: Fix pointer-to-int-cast warning in siw_rx_pbl() (git-fixes).\n- RDMA/siw: Fix potential siw_mem refcnt leak in siw_fastreg_mr() (git-fixes).\n- RDMA/siw: Fix reporting vendor_part_id (git-fixes).\n- RDMA/siw: Fix setting active_mtu attribute (git-fixes).\n- RDMA/siw: Fix setting active_{speed, width} attributes (git-fixes).\n- RDMA/ucma: Put a lock around every call to the rdma_cm layer (git-fixes).\n- RDMA/uverbs: Fix create WQ to use the given user handle (git-fixes).\n- regmap: debugfs: check count when read regmap file (git-fixes).\n- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (git-fixes).\n- regmap: dev_get_regmap_match(): fix string comparison (git-fixes).\n- regmap: fix alignment issue (git-fixes).\n- regmap: Fix memory leak from regmap_register_patch (git-fixes).\n- regulator: gpio: Honor regulator-boot-on property (git-fixes).\n- remoteproc: qcom_q6v5_mss: Validate MBA firmware size before load (git-fixes).\n- remoteproc: qcom_q6v5_mss: Validate modem blob firmware size before load (git-fixes).\n- remoteproc: qcom: q6v5: Update running state before requesting stop (git-fixes).\n- Revert \u0027ALSA: hda: call runtime_allow() for all hda controllers\u0027 (git-fixes).\n- Revert \u0027drm/amd/display: Expose connector VRR range via debugfs\u0027 (bsc#1152489) \t* refreshed for context changes\n- Revert \u0027drm/amdgpu: Fix NULL dereference in dpm sysfs handlers\u0027 (git-fixes).\n- Revert \u0027i2c: cadence: Fix the hold bit setting\u0027 (git-fixes).\n- Revert \u0027RDMA/cma: Simplify rdma_resolve_addr() error flow\u0027 (git-fixes).\n- Revert \u0027thermal: mediatek: fix register index error\u0027 (git-fixes).\n- rhashtable: Document the right function parameters (bsc#1174880).\n- rhashtable: drop duplicated word in \u0026lt;linux/rhashtable.h\u003e (bsc#1174880).\n- rhashtable: Drop raw RCU deref in nested_table_free (bsc#1174880).\n- rhashtable: Fix unprotected RCU dereference in __rht_ptr (bsc#1174880).\n- rhashtable: Restore RCU marking on rhash_lock_head (bsc#1174880).\n- RMDA/cm: Fix missing ib_cm_destroy_id() in ib_cm_insert_listen() (git-fixes).\n- rpm/kernel-obs-build.spec.in: Enable overlayfs Overlayfs is needed for podman or docker builds when no more specific driver can be used (like lvm or btrfs). As the default build fs is ext4 currently, we need overlayfs kernel modules to be available.\n- rpm/modules.fips: add ecdh_generic (boo#1173813)\n- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).\n- rtnetlink: Fix memory(net_device) leak when -\u003enewlink fails (bsc#1154353).\n- rtnetlink: Fix memory(net_device) leak when -\u003enewlink fails (git-fixes).\n- rtw88: fix LDPC field for RA info (git-fixes).\n- rtw88: fix short GI capability based on current bandwidth (git-fixes).\n- s390: fix syscall_get_error for compat processes (git-fixes).\n- s390/ism: fix error return code in ism_probe() (git-fixes).\n- s390/kaslr: add support for R_390_JMP_SLOT relocation type (git-fixes).\n- s390/pci: Fix s390_mmio_read/write with MIO (git-fixes).\n- s390/qdio: consistently restore the IRQ handler (git-fixes).\n- s390/qdio: put thinint indicator after early error (git-fixes).\n- s390/qdio: tear down thinint indicator after early error (git-fixes).\n- s390/qeth: fix error handling for isolation mode cmds (git-fixes).\n- sched/fair: handle case of task_h_load() returning 0 (bnc#1155798 (CPU scheduler functional and performance backports)).\n- scsi: ipr: Fix softlockup when rescanning devices in petitboot (jsc#SLE-13654).\n- scsi: ipr: Fix softlockup when rescanning devices in petitboot (jsc#SLE-13654).\n- scsi: ipr: remove unneeded semicolon (jsc#SLE-13654).\n- scsi: ipr: Use scnprintf() for avoiding potential buffer overflow (jsc#SLE-13654).\n- scsi: ipr: Use scnprintf() for avoiding potential buffer overflow (jsc#SLE-13654).\n- scsi: libfc: free response frame from GPN_ID (bsc#1173849).\n- scsi: libfc: Handling of extra kref (bsc#1173849).\n- scsi: libfc: If PRLI rejected, move rport to PLOGI state (bsc#1173849).\n- scsi: libfc: rport state move to PLOGI if all PRLI retry exhausted (bsc#1173849).\n- scsi: libfc: Skip additional kref updating work event (bsc#1173849).\n- scsi: ufs-bsg: Fix runtime PM imbalance on error (git-fixes).\n- scsi: zfcp: Fix panic on ERP timeout for previously dismissed ERP action (git-fixes).\n- selftests/net: in rxtimestamp getopt_long needs terminating null entry (networking-stable-20_06_16).\n- selinux: fall back to ref-walk if audit is required (bsc#1174333).\n- selinux: revert \u0027stop passing MAY_NOT_BLOCK to the AVC upon follow_link\u0027 (bsc#1174333).\n- seq_buf: Export seq_buf_printf (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n- seq_buf: Export seq_buf_printf (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n- serial: 8250: fix null-ptr-deref in serial8250_start_tx() (git-fixes).\n- serial: 8250_mtk: Fix high-speed baud rates clamping (git-fixes).\n- serial: 8250_pci: Move Pericom IDs to pci_ids.h (git-fixes).\n- serial: 8250_tegra: Create Tegra specific 8250 driver (bsc#1173941).\n- serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes).\n- serial: exar: Fix GPIO configuration for Sealevel cards based on XR17V35X (git-fixes).\n- serial: mxs-auart: add missed iounmap() in probe failure and remove (git-fixes).\n- serial: tegra: fix CREAD handling for PIO (git-fixes).\n- SMB3: Honor lease disabling for multiuser mounts (git-fixes).\n- soc/tegra: pmc: Enable PMIC wake event on Tegra210 (bsc#1175116).\n- soundwire: intel: fix memory leak with devm_kasprintf (git-fixes).\n- spi: davinci: Remove uninitialized_var() usage (git-fixes).\n- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).\n- spi: lantiq-ssc: Fix warning by using WQ_MEM_RECLAIM (git-fixes).\n- spi: mediatek: use correct SPI_CFG2_REG MACRO (git-fixes).\n- spi: rockchip: Fix error in SPI slave pio read (git-fixes).\n- spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).\n- spi: spidev: fix a race between spidev_release and spidev_remove (git-fixes).\n- spi: spi-geni-qcom: Actually use our FIFO (git-fixes).\n- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (git-fixes).\n- spi: sun4i: update max transfer size reported (git-fixes).\n- staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).\n- staging: comedi: verify array index is correct before using it (git-fixes).\n- Staging: rtl8188eu: rtw_mlme: Fix uninitialized variable authmode (git-fixes).\n- staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).\n- staging: rtl8712: handle firmware load failure (git-fixes).\n- staging: vchiq_arm: Add a matching unregister call (git-fixes).\n- staging: wlan-ng: properly check endpoint types (git-fixes).\n- SUNRPC dont update timeout value on connection reset (bsc#1174263).\n- sunrpc: Fix gss_unwrap_resp_integ() again (bsc#1174116).\n- tcp: md5: allow changing MD5 keys in all socket states (git-fixes).\n- thermal/drivers: imx: Fix missing of_node_put() at probe time (git-fixes).\n- thermal: int3403_thermal: Downgrade error message (git-fixes).\n- thermal: ti-soc-thermal: Fix reversed condition in ti_thermal_expose_sensor() (git-fixes).\n- tpm_crb: fix fTPM on AMD Zen+ CPUs (bsc#1174362).\n- tpm: Require that all digests are present in TCG_PCR_EVENT2 structures (git-fixes).\n- tpm_tis: extra chip-\u003eops check on error path in tpm_tis_core_init (git-fixes).\n- tty: hvc_console, fix crashes on parallel open/close (git-fixes).\n- ubsan: check panic_on_warn (bsc#1174805).\n- udp: Copy has_conns in reuseport_grow() (git-fixes).\n- udp: Improve load balancing for SO_REUSEPORT (git-fixes).\n- uio_pdrv_genirq: Remove warning when irq is not specified (bsc#1174762).\n- USB: c67x00: fix use after free in c67x00_giveback_urb (git-fixes).\n- usb: chipidea: core: add wakeup support for extcon (git-fixes).\n- usb: core: fix quirks_param_set() writing to a const pointer (git-fixes).\n- usb: dwc2: Fix shutdown callback in platform (git-fixes).\n- usb: dwc2: gadget: Make use of GINTMSK2 (git-fixes).\n- usb: dwc3: pci: add support for the Intel Jasper Lake (git-fixes).\n- usb: dwc3: pci: add support for the Intel Tiger Lake PCH -H variant (git-fixes).\n- usb: dwc3: pci: Fix reference count leak in dwc3_pci_resume_work (git-fixes).\n- usb: gadget: Fix issue with config_ep_by_speed function (git-fixes).\n- usb: gadget: f_uac2: fix AC Interface Header Descriptor wTotalLength (git-fixes).\n- usb: gadget: function: fix missing spinlock in f_uac1_legacy (git-fixes).\n- usb: gadget: udc: atmel: fix uninitialized read in debug printk (git-fixes).\n- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (git-fixes).\n- usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes).\n- usb: hso: check for return value in hso_serial_common_create() (git-fixes).\n- usb: hso: Fix debug compile warning on sparc32 (git-fixes).\n- USB: iowarrior: fix up report size handling for some devices (git-fixes).\n- usbip: tools: fix module name in man page (git-fixes).\n- usbnet: smsc95xx: Fix use-after-free after removal (git-fixes).\n- USB: serial: ch341: add new Product ID for CH340 (git-fixes).\n- USB: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).\n- USB: serial: cp210x: re-enable auto-RTS on open (git-fixes).\n- USB: serial: cypress_m8: enable Simply Automated UPB PIM (git-fixes).\n- USB: serial: iuu_phoenix: fix led-activity helpers (git-fixes).\n- USB: serial: iuu_phoenix: fix memory corruption (git-fixes).\n- USB: serial: option: add GosunCn GM500 series (git-fixes).\n- USB: serial: option: add Quectel EG95 LTE modem (git-fixes).\n- USB: serial: qcserial: add EM7305 QDL product ID (git-fixes).\n- usb: tegra: Fix allocation for the FPCI context (git-fixes).\n- usb: xhci: define IDs for various ASMedia host controllers (git-fixes).\n- usb: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).\n- usb: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).\n- usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).\n- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174129).\n- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).\n- video: pxafb: Fix the function used to balance a \u0027dma_alloc_coherent()\u0027 call (git-fixes).\n- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).\n- virt: vbox: Fix guest capabilities mask check (git-fixes).\n- virt: vbox: Fix VBGL_IOCTL_VMMDEV_REQUEST_BIG and _LOG req numbers to match upstream (git-fixes).\n- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).\n- vt: Reject zero-sized screen buffer size (git-fixes).\n- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).\n- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (git-fixes).\n- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (git-fixes).\n- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (git-fixes).\n- watchdog: initialize device before misc_register (git-fixes).\n- watchdog: iTCO: Add support for Cannon Lake PCH iTCO (jsc#SLE-13202).\n- watchdog: iTCO: Add support for Cannon Lake PCH iTCO (jsc#SLE-13202).\n- wireless: Use linux/stddef.h instead of stddef.h (git-fixes).\n- wireless: Use offsetof instead of custom macro (git-fixes).\n- wl1251: fix always return 0 error (git-fixes).\n- workqueue: Remove unnecessary kfree() call in rcu_free_wq() (git-fixes).\n- xen/pvcalls-back: test for errors when calling backend_connect() (bsc#1065600).\n- xfrm: fix a warning in xfrm_policy_insert_list (bsc#1174645).\n- xfrm: policy: match with both mark and mask on user interfaces (bsc#1174645).\n- xfs: do not eat an EIO/ENOSPC writeback error when scrubbing data fork (git-fixes).\n- xfs: fix inode allocation block res calculation precedence (git-fixes).\n- xfs: fix reflink quota reservation accounting error (git-fixes).\n- xfs: preserve rmapbt swapext block reservation from freed blocks (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-1236", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1236-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:1236-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RZBOHACFHPZE53IZN4OJDZ5XKOOT76WT/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:1236-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RZBOHACFHPZE53IZN4OJDZ5XKOOT76WT/" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1120163", "url": "https://bugzilla.suse.com/1120163" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1149032", "url": "https://bugzilla.suse.com/1149032" }, { "category": "self", "summary": "SUSE Bug 1152472", "url": "https://bugzilla.suse.com/1152472" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1153274", "url": "https://bugzilla.suse.com/1153274" }, { "category": "self", "summary": "SUSE Bug 1154353", "url": "https://bugzilla.suse.com/1154353" }, { "category": "self", "summary": "SUSE Bug 1154488", "url": "https://bugzilla.suse.com/1154488" }, { "category": "self", "summary": "SUSE Bug 1155518", "url": "https://bugzilla.suse.com/1155518" }, { "category": "self", "summary": "SUSE Bug 1155798", "url": "https://bugzilla.suse.com/1155798" }, { "category": "self", "summary": "SUSE Bug 1165933", "url": "https://bugzilla.suse.com/1165933" }, { "category": "self", "summary": "SUSE Bug 1167773", "url": "https://bugzilla.suse.com/1167773" }, { "category": "self", "summary": "SUSE Bug 1168959", "url": "https://bugzilla.suse.com/1168959" }, { "category": "self", "summary": "SUSE Bug 1169771", "url": "https://bugzilla.suse.com/1169771" }, { "category": "self", "summary": "SUSE Bug 1171857", "url": "https://bugzilla.suse.com/1171857" }, { "category": "self", "summary": "SUSE Bug 1171988", "url": "https://bugzilla.suse.com/1171988" }, { "category": "self", "summary": "SUSE Bug 1172197", "url": "https://bugzilla.suse.com/1172197" }, { "category": "self", "summary": "SUSE Bug 1172201", "url": "https://bugzilla.suse.com/1172201" }, { "category": "self", "summary": "SUSE Bug 1172247", "url": "https://bugzilla.suse.com/1172247" }, { "category": "self", "summary": "SUSE Bug 1172963", "url": "https://bugzilla.suse.com/1172963" }, { "category": "self", "summary": "SUSE Bug 1173074", "url": "https://bugzilla.suse.com/1173074" }, { "category": "self", "summary": "SUSE Bug 1173468", "url": "https://bugzilla.suse.com/1173468" }, { "category": "self", "summary": "SUSE Bug 1173573", "url": "https://bugzilla.suse.com/1173573" }, { "category": "self", "summary": "SUSE Bug 1173813", "url": "https://bugzilla.suse.com/1173813" }, { "category": "self", "summary": "SUSE Bug 1173849", "url": "https://bugzilla.suse.com/1173849" }, { "category": "self", "summary": "SUSE Bug 1173941", "url": "https://bugzilla.suse.com/1173941" }, { "category": "self", "summary": "SUSE Bug 1173954", "url": "https://bugzilla.suse.com/1173954" }, { "category": "self", "summary": "SUSE Bug 1174002", "url": "https://bugzilla.suse.com/1174002" }, { "category": "self", "summary": "SUSE Bug 1174072", "url": "https://bugzilla.suse.com/1174072" }, { "category": "self", "summary": "SUSE Bug 1174116", "url": "https://bugzilla.suse.com/1174116" }, { "category": "self", "summary": "SUSE Bug 1174126", "url": "https://bugzilla.suse.com/1174126" }, { "category": "self", "summary": "SUSE Bug 1174127", "url": "https://bugzilla.suse.com/1174127" }, { "category": "self", "summary": "SUSE Bug 1174128", "url": "https://bugzilla.suse.com/1174128" }, { "category": "self", "summary": "SUSE Bug 1174129", "url": "https://bugzilla.suse.com/1174129" }, { "category": "self", "summary": "SUSE Bug 1174185", "url": "https://bugzilla.suse.com/1174185" }, { "category": "self", "summary": "SUSE Bug 1174205", "url": "https://bugzilla.suse.com/1174205" }, { "category": "self", "summary": "SUSE Bug 1174263", "url": "https://bugzilla.suse.com/1174263" }, { "category": "self", "summary": "SUSE Bug 1174264", "url": "https://bugzilla.suse.com/1174264" }, { "category": "self", "summary": "SUSE Bug 1174331", "url": "https://bugzilla.suse.com/1174331" }, { "category": "self", "summary": "SUSE Bug 1174332", "url": "https://bugzilla.suse.com/1174332" }, { "category": "self", "summary": "SUSE Bug 1174333", "url": "https://bugzilla.suse.com/1174333" }, { "category": "self", "summary": "SUSE Bug 1174356", "url": "https://bugzilla.suse.com/1174356" }, { "category": "self", "summary": "SUSE Bug 1174362", "url": "https://bugzilla.suse.com/1174362" }, { "category": "self", "summary": "SUSE Bug 1174396", "url": "https://bugzilla.suse.com/1174396" }, { "category": "self", "summary": "SUSE Bug 1174398", "url": "https://bugzilla.suse.com/1174398" }, { "category": "self", "summary": "SUSE Bug 1174407", "url": "https://bugzilla.suse.com/1174407" }, { "category": "self", "summary": "SUSE Bug 1174409", "url": "https://bugzilla.suse.com/1174409" }, { "category": "self", "summary": "SUSE Bug 1174411", "url": "https://bugzilla.suse.com/1174411" }, { "category": "self", "summary": "SUSE Bug 1174438", "url": "https://bugzilla.suse.com/1174438" }, { "category": "self", "summary": "SUSE Bug 1174462", "url": "https://bugzilla.suse.com/1174462" }, { "category": "self", "summary": "SUSE Bug 1174484", "url": "https://bugzilla.suse.com/1174484" }, { "category": "self", "summary": "SUSE Bug 1174513", "url": "https://bugzilla.suse.com/1174513" }, { "category": "self", "summary": "SUSE Bug 1174527", "url": "https://bugzilla.suse.com/1174527" }, { "category": "self", "summary": "SUSE Bug 1174543", "url": "https://bugzilla.suse.com/1174543" }, { "category": "self", "summary": "SUSE Bug 1174625", "url": "https://bugzilla.suse.com/1174625" }, { "category": "self", "summary": "SUSE Bug 1174627", "url": "https://bugzilla.suse.com/1174627" }, { "category": "self", "summary": "SUSE Bug 1174645", "url": "https://bugzilla.suse.com/1174645" }, { "category": "self", "summary": "SUSE Bug 1174689", "url": "https://bugzilla.suse.com/1174689" }, { "category": "self", "summary": "SUSE Bug 1174737", "url": "https://bugzilla.suse.com/1174737" }, { "category": "self", "summary": "SUSE Bug 1174757", "url": "https://bugzilla.suse.com/1174757" }, { "category": "self", "summary": "SUSE Bug 1174762", "url": "https://bugzilla.suse.com/1174762" }, { "category": "self", "summary": "SUSE Bug 1174770", "url": "https://bugzilla.suse.com/1174770" }, { "category": "self", "summary": "SUSE Bug 1174805", "url": "https://bugzilla.suse.com/1174805" }, { "category": "self", "summary": "SUSE Bug 1174824", "url": "https://bugzilla.suse.com/1174824" }, { "category": "self", "summary": "SUSE Bug 1174825", "url": "https://bugzilla.suse.com/1174825" }, { "category": "self", "summary": "SUSE Bug 1174852", "url": "https://bugzilla.suse.com/1174852" }, { "category": "self", "summary": "SUSE Bug 1174865", "url": "https://bugzilla.suse.com/1174865" }, { "category": "self", "summary": "SUSE Bug 1174880", "url": "https://bugzilla.suse.com/1174880" }, { "category": "self", "summary": "SUSE Bug 1174897", "url": "https://bugzilla.suse.com/1174897" }, { "category": "self", "summary": "SUSE Bug 1174906", "url": "https://bugzilla.suse.com/1174906" }, { "category": "self", "summary": "SUSE Bug 1174969", "url": "https://bugzilla.suse.com/1174969" }, { "category": "self", "summary": "SUSE Bug 1175009", "url": "https://bugzilla.suse.com/1175009" }, { "category": "self", "summary": "SUSE Bug 1175010", "url": "https://bugzilla.suse.com/1175010" }, { "category": "self", "summary": "SUSE Bug 1175011", "url": "https://bugzilla.suse.com/1175011" }, { "category": "self", "summary": "SUSE Bug 1175012", "url": "https://bugzilla.suse.com/1175012" }, { "category": "self", "summary": "SUSE Bug 1175013", "url": "https://bugzilla.suse.com/1175013" }, { "category": "self", "summary": "SUSE Bug 1175014", "url": "https://bugzilla.suse.com/1175014" }, { "category": "self", "summary": "SUSE Bug 1175015", "url": "https://bugzilla.suse.com/1175015" }, { "category": "self", "summary": "SUSE Bug 1175016", "url": "https://bugzilla.suse.com/1175016" }, { "category": "self", "summary": "SUSE Bug 1175017", "url": "https://bugzilla.suse.com/1175017" }, { "category": "self", "summary": "SUSE Bug 1175018", "url": "https://bugzilla.suse.com/1175018" }, { "category": "self", "summary": "SUSE Bug 1175019", "url": "https://bugzilla.suse.com/1175019" }, { "category": "self", "summary": "SUSE Bug 1175020", "url": "https://bugzilla.suse.com/1175020" }, { "category": "self", "summary": "SUSE Bug 1175021", "url": "https://bugzilla.suse.com/1175021" }, { "category": "self", "summary": "SUSE Bug 1175052", "url": "https://bugzilla.suse.com/1175052" }, { "category": "self", "summary": "SUSE Bug 1175112", "url": "https://bugzilla.suse.com/1175112" }, { "category": "self", "summary": "SUSE Bug 1175116", "url": "https://bugzilla.suse.com/1175116" }, { "category": "self", "summary": "SUSE Bug 1175149", "url": "https://bugzilla.suse.com/1175149" }, { "category": "self", "summary": "SUSE Bug 1175175", "url": "https://bugzilla.suse.com/1175175" }, { "category": "self", "summary": "SUSE Bug 1175176", "url": "https://bugzilla.suse.com/1175176" }, { "category": "self", "summary": "SUSE Bug 1175180", "url": "https://bugzilla.suse.com/1175180" }, { "category": "self", "summary": "SUSE Bug 1175181", "url": "https://bugzilla.suse.com/1175181" }, { "category": "self", "summary": "SUSE Bug 1175182", "url": "https://bugzilla.suse.com/1175182" }, { "category": "self", "summary": "SUSE Bug 1175183", "url": "https://bugzilla.suse.com/1175183" }, { "category": "self", "summary": "SUSE Bug 1175184", "url": "https://bugzilla.suse.com/1175184" }, { "category": "self", "summary": "SUSE Bug 1175185", "url": "https://bugzilla.suse.com/1175185" }, { "category": "self", "summary": "SUSE Bug 1175186", "url": "https://bugzilla.suse.com/1175186" }, { "category": "self", "summary": "SUSE Bug 1175187", "url": "https://bugzilla.suse.com/1175187" }, { "category": "self", "summary": "SUSE Bug 1175188", "url": "https://bugzilla.suse.com/1175188" }, { "category": "self", "summary": "SUSE Bug 1175189", "url": "https://bugzilla.suse.com/1175189" }, { "category": "self", "summary": "SUSE Bug 1175190", "url": "https://bugzilla.suse.com/1175190" }, { "category": "self", "summary": "SUSE Bug 1175191", "url": "https://bugzilla.suse.com/1175191" }, { "category": "self", "summary": "SUSE Bug 1175192", "url": "https://bugzilla.suse.com/1175192" }, { "category": "self", "summary": "SUSE Bug 1175195", "url": "https://bugzilla.suse.com/1175195" }, { "category": "self", "summary": "SUSE Bug 1175213", "url": "https://bugzilla.suse.com/1175213" }, { "category": "self", "summary": "SUSE Bug 1175263", "url": "https://bugzilla.suse.com/1175263" }, { "category": "self", "summary": "SUSE Bug 1175284", "url": "https://bugzilla.suse.com/1175284" }, { "category": "self", "summary": "SUSE Bug 1175296", "url": "https://bugzilla.suse.com/1175296" }, { "category": "self", "summary": "SUSE Bug 1175344", "url": "https://bugzilla.suse.com/1175344" }, { "category": "self", "summary": "SUSE Bug 1175345", "url": "https://bugzilla.suse.com/1175345" }, { "category": "self", "summary": "SUSE Bug 1175346", "url": "https://bugzilla.suse.com/1175346" }, { "category": "self", "summary": "SUSE Bug 1175347", "url": "https://bugzilla.suse.com/1175347" }, { "category": "self", "summary": "SUSE Bug 1175367", "url": "https://bugzilla.suse.com/1175367" }, { "category": "self", "summary": "SUSE Bug 1175377", "url": "https://bugzilla.suse.com/1175377" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0305 page", "url": "https://www.suse.com/security/cve/CVE-2020-0305/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10781 page", "url": "https://www.suse.com/security/cve/CVE-2020-10781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14356 page", "url": "https://www.suse.com/security/cve/CVE-2020-14356/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16166 page", "url": "https://www.suse.com/security/cve/CVE-2020-16166/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-08-20T22:20:42Z", "generator": { "date": "2020-08-20T22:20:42Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:1236-1", "initial_release_date": "2020-08-20T22:20:42Z", "revision_history": [ { "date": "2020-08-20T22:20:42Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "dpdk-doc-19.11.1-lp152.2.5.1.noarch", "product": { "name": "dpdk-doc-19.11.1-lp152.2.5.1.noarch", "product_id": "dpdk-doc-19.11.1-lp152.2.5.1.noarch" } }, { "category": "product_version", "name": "kernel-devel-5.3.18-lp152.36.1.noarch", "product": { "name": "kernel-devel-5.3.18-lp152.36.1.noarch", "product_id": "kernel-devel-5.3.18-lp152.36.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-5.3.18-lp152.36.1.noarch", "product": { "name": "kernel-docs-5.3.18-lp152.36.1.noarch", "product_id": "kernel-docs-5.3.18-lp152.36.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-5.3.18-lp152.36.1.noarch", "product": { "name": "kernel-docs-html-5.3.18-lp152.36.1.noarch", "product_id": "kernel-docs-html-5.3.18-lp152.36.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-5.3.18-lp152.36.1.noarch", "product": { "name": "kernel-macros-5.3.18-lp152.36.1.noarch", "product_id": "kernel-macros-5.3.18-lp152.36.1.noarch" } }, { "category": "product_version", "name": "kernel-source-5.3.18-lp152.36.1.noarch", "product": { "name": "kernel-source-5.3.18-lp152.36.1.noarch", "product_id": "kernel-source-5.3.18-lp152.36.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.3.18-lp152.36.1.noarch", "product": { "name": "kernel-source-vanilla-5.3.18-lp152.36.1.noarch", "product_id": "kernel-source-vanilla-5.3.18-lp152.36.1.noarch" } }, { "category": "product_version", "name": "virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1.noarch", "product": { "name": "virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1.noarch", "product_id": "virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1.noarch" } }, { "category": "product_version", "name": "virtualbox-guest-source-6.1.10-lp152.2.2.1.noarch", "product": { "name": "virtualbox-guest-source-6.1.10-lp152.2.2.1.noarch", "product_id": "virtualbox-guest-source-6.1.10-lp152.2.2.1.noarch" } }, { "category": "product_version", "name": "virtualbox-host-source-6.1.10-lp152.2.2.1.noarch", "product": { "name": "virtualbox-host-source-6.1.10-lp152.2.2.1.noarch", "product_id": "virtualbox-host-source-6.1.10-lp152.2.2.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "bbswitch-0.8-lp152.6.2.1.x86_64", "product": { "name": "bbswitch-0.8-lp152.6.2.1.x86_64", "product_id": "bbswitch-0.8-lp152.6.2.1.x86_64" } }, { "category": "product_version", "name": "bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "product": { "name": "bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "product_id": "bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64" } }, { "category": "product_version", "name": "bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "product": { "name": "bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "product_id": "bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64" } }, { "category": "product_version", "name": "crash-7.2.8-lp152.3.2.1.x86_64", "product": { "name": "crash-7.2.8-lp152.3.2.1.x86_64", "product_id": "crash-7.2.8-lp152.3.2.1.x86_64" } }, { "category": "product_version", "name": "crash-devel-7.2.8-lp152.3.2.1.x86_64", "product": { "name": "crash-devel-7.2.8-lp152.3.2.1.x86_64", "product_id": "crash-devel-7.2.8-lp152.3.2.1.x86_64" } }, { "category": "product_version", "name": "crash-doc-7.2.8-lp152.3.2.1.x86_64", "product": { "name": "crash-doc-7.2.8-lp152.3.2.1.x86_64", "product_id": "crash-doc-7.2.8-lp152.3.2.1.x86_64" } }, { "category": "product_version", "name": "crash-eppic-7.2.8-lp152.3.2.1.x86_64", "product": { "name": "crash-eppic-7.2.8-lp152.3.2.1.x86_64", "product_id": "crash-eppic-7.2.8-lp152.3.2.1.x86_64" } }, { "category": "product_version", "name": "crash-gcore-7.2.8-lp152.3.2.1.x86_64", "product": { "name": "crash-gcore-7.2.8-lp152.3.2.1.x86_64", "product_id": "crash-gcore-7.2.8-lp152.3.2.1.x86_64" } }, { "category": "product_version", "name": "crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "product": { "name": "crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "product_id": "crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64" } }, { "category": "product_version", "name": "crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "product": { "name": "crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "product_id": "crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64" } }, { "category": "product_version", "name": "dpdk-19.11.1-lp152.2.5.1.x86_64", "product": { "name": "dpdk-19.11.1-lp152.2.5.1.x86_64", "product_id": "dpdk-19.11.1-lp152.2.5.1.x86_64" } }, { "category": "product_version", "name": "dpdk-devel-19.11.1-lp152.2.5.1.x86_64", "product": { "name": "dpdk-devel-19.11.1-lp152.2.5.1.x86_64", "product_id": "dpdk-devel-19.11.1-lp152.2.5.1.x86_64" } }, { "category": "product_version", "name": "dpdk-examples-19.11.1-lp152.2.5.1.x86_64", "product": { "name": "dpdk-examples-19.11.1-lp152.2.5.1.x86_64", "product_id": "dpdk-examples-19.11.1-lp152.2.5.1.x86_64" } }, { "category": "product_version", "name": "dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "product": { "name": "dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "product_id": "dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64" } }, { "category": "product_version", "name": "dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "product": { "name": "dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "product_id": "dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64" } }, { "category": "product_version", "name": "dpdk-tools-19.11.1-lp152.2.5.1.x86_64", "product": { "name": "dpdk-tools-19.11.1-lp152.2.5.1.x86_64", "product_id": "dpdk-tools-19.11.1-lp152.2.5.1.x86_64" } }, { "category": "product_version", "name": "drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1.x86_64", "product": { "name": "drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1.x86_64", "product_id": "drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product": { "name": "drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product_id": "drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product": { "name": "drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product_id": "drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "product": { "name": "hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "product_id": "hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64" } }, { "category": "product_version", "name": "hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "product": { "name": "hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "product_id": "hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-lp152.36.1.x86_64", "product": { "name": "kernel-debug-5.3.18-lp152.36.1.x86_64", "product_id": "kernel-debug-5.3.18-lp152.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-lp152.36.1.x86_64", "product": { "name": "kernel-debug-devel-5.3.18-lp152.36.1.x86_64", "product_id": "kernel-debug-devel-5.3.18-lp152.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-lp152.36.1.x86_64", "product": { "name": "kernel-default-5.3.18-lp152.36.1.x86_64", "product_id": "kernel-default-5.3.18-lp152.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-lp152.36.1.x86_64", "product": { "name": "kernel-default-devel-5.3.18-lp152.36.1.x86_64", "product_id": "kernel-default-devel-5.3.18-lp152.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-lp152.36.1.x86_64", "product": { "name": "kernel-kvmsmall-5.3.18-lp152.36.1.x86_64", "product_id": "kernel-kvmsmall-5.3.18-lp152.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-lp152.36.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-5.3.18-lp152.36.1.x86_64", "product_id": "kernel-kvmsmall-devel-5.3.18-lp152.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-lp152.36.1.x86_64", "product": { "name": "kernel-obs-build-5.3.18-lp152.36.1.x86_64", "product_id": "kernel-obs-build-5.3.18-lp152.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-lp152.36.1.x86_64", "product": { "name": "kernel-obs-qa-5.3.18-lp152.36.1.x86_64", "product_id": "kernel-obs-qa-5.3.18-lp152.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-lp152.36.1.x86_64", "product": { "name": "kernel-preempt-5.3.18-lp152.36.1.x86_64", "product_id": "kernel-preempt-5.3.18-lp152.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-lp152.36.1.x86_64", "product": { "name": "kernel-preempt-devel-5.3.18-lp152.36.1.x86_64", "product_id": "kernel-preempt-devel-5.3.18-lp152.36.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-lp152.36.1.x86_64", "product": { "name": "kernel-syms-5.3.18-lp152.36.1.x86_64", "product_id": "kernel-syms-5.3.18-lp152.36.1.x86_64" } }, { "category": "product_version", "name": "libdpdk-20_0-19.11.1-lp152.2.5.1.x86_64", "product": { "name": "libdpdk-20_0-19.11.1-lp152.2.5.1.x86_64", "product_id": "libdpdk-20_0-19.11.1-lp152.2.5.1.x86_64" } }, { "category": "product_version", "name": "mhvtl-1.62-lp152.2.2.1.x86_64", "product": { "name": "mhvtl-1.62-lp152.2.2.1.x86_64", "product_id": "mhvtl-1.62-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product": { "name": "mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product_id": "mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product": { "name": "mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product_id": "mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "openafs-1.8.5-lp152.2.2.1.x86_64", "product": { "name": "openafs-1.8.5-lp152.2.2.1.x86_64", "product_id": "openafs-1.8.5-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "openafs-authlibs-1.8.5-lp152.2.2.1.x86_64", "product": { "name": "openafs-authlibs-1.8.5-lp152.2.2.1.x86_64", "product_id": "openafs-authlibs-1.8.5-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "openafs-authlibs-devel-1.8.5-lp152.2.2.1.x86_64", "product": { "name": "openafs-authlibs-devel-1.8.5-lp152.2.2.1.x86_64", "product_id": "openafs-authlibs-devel-1.8.5-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "openafs-client-1.8.5-lp152.2.2.1.x86_64", "product": { "name": "openafs-client-1.8.5-lp152.2.2.1.x86_64", "product_id": "openafs-client-1.8.5-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "openafs-devel-1.8.5-lp152.2.2.1.x86_64", "product": { "name": "openafs-devel-1.8.5-lp152.2.2.1.x86_64", "product_id": "openafs-devel-1.8.5-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "openafs-fuse_client-1.8.5-lp152.2.2.1.x86_64", "product": { "name": "openafs-fuse_client-1.8.5-lp152.2.2.1.x86_64", "product_id": "openafs-fuse_client-1.8.5-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "openafs-kernel-source-1.8.5-lp152.2.2.1.x86_64", "product": { "name": "openafs-kernel-source-1.8.5-lp152.2.2.1.x86_64", "product_id": "openafs-kernel-source-1.8.5-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product": { "name": "openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product_id": "openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product": { "name": "openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product_id": "openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "openafs-server-1.8.5-lp152.2.2.1.x86_64", "product": { "name": "openafs-server-1.8.5-lp152.2.2.1.x86_64", "product_id": "openafs-server-1.8.5-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "pcfclock-0.44-lp152.4.2.1.x86_64", "product": { "name": "pcfclock-0.44-lp152.4.2.1.x86_64", "product_id": "pcfclock-0.44-lp152.4.2.1.x86_64" } }, { "category": "product_version", "name": "pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "product": { "name": "pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "product_id": "pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64" } }, { "category": "product_version", "name": "pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "product": { "name": "pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "product_id": "pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64" } }, { "category": "product_version", "name": "python3-virtualbox-6.1.10-lp152.2.2.1.x86_64", "product": { "name": "python3-virtualbox-6.1.10-lp152.2.2.1.x86_64", "product_id": "python3-virtualbox-6.1.10-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1.x86_64", "product": { "name": "rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1.x86_64", "product_id": "rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product": { "name": "rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product_id": "rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product": { "name": "rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product_id": "rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "sysdig-0.26.5-lp152.3.2.1.x86_64", "product": { "name": "sysdig-0.26.5-lp152.3.2.1.x86_64", "product_id": "sysdig-0.26.5-lp152.3.2.1.x86_64" } }, { "category": "product_version", "name": "sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "product": { "name": "sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "product_id": "sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64" } }, { "category": "product_version", "name": "sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "product": { "name": "sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "product_id": "sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64" } }, { "category": "product_version", "name": "v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product": { "name": "v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product_id": "v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product": { "name": "v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product_id": "v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "v4l2loopback-utils-0.12.5-lp152.2.2.1.x86_64", "product": { "name": "v4l2loopback-utils-0.12.5-lp152.2.2.1.x86_64", "product_id": "v4l2loopback-utils-0.12.5-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product": { "name": "vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product_id": "vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product": { "name": "vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product_id": "vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "virtualbox-6.1.10-lp152.2.2.1.x86_64", "product": { "name": "virtualbox-6.1.10-lp152.2.2.1.x86_64", "product_id": "virtualbox-6.1.10-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "virtualbox-devel-6.1.10-lp152.2.2.1.x86_64", "product": { "name": "virtualbox-devel-6.1.10-lp152.2.2.1.x86_64", "product_id": "virtualbox-devel-6.1.10-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "virtualbox-guest-tools-6.1.10-lp152.2.2.1.x86_64", "product": { "name": "virtualbox-guest-tools-6.1.10-lp152.2.2.1.x86_64", "product_id": "virtualbox-guest-tools-6.1.10-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "virtualbox-guest-x11-6.1.10-lp152.2.2.1.x86_64", "product": { "name": "virtualbox-guest-x11-6.1.10-lp152.2.2.1.x86_64", "product_id": "virtualbox-guest-x11-6.1.10-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product": { "name": "virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product_id": "virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product": { "name": "virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product_id": "virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "virtualbox-qt-6.1.10-lp152.2.2.1.x86_64", "product": { "name": "virtualbox-qt-6.1.10-lp152.2.2.1.x86_64", "product_id": "virtualbox-qt-6.1.10-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "virtualbox-vnc-6.1.10-lp152.2.2.1.x86_64", "product": { "name": "virtualbox-vnc-6.1.10-lp152.2.2.1.x86_64", "product_id": "virtualbox-vnc-6.1.10-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "virtualbox-websrv-6.1.10-lp152.2.2.1.x86_64", "product": { "name": "virtualbox-websrv-6.1.10-lp152.2.2.1.x86_64", "product_id": "virtualbox-websrv-6.1.10-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "xtables-addons-3.9-lp152.2.2.1.x86_64", "product": { "name": "xtables-addons-3.9-lp152.2.2.1.x86_64", "product_id": "xtables-addons-3.9-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product": { "name": "xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product_id": "xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64" } }, { "category": "product_version", "name": "xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product": { "name": "xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "product_id": "xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.2", "product": { "name": "openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bbswitch-0.8-lp152.6.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:bbswitch-0.8-lp152.6.2.1.x86_64" }, "product_reference": "bbswitch-0.8-lp152.6.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64" }, "product_reference": "bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64" }, "product_reference": "bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "crash-7.2.8-lp152.3.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:crash-7.2.8-lp152.3.2.1.x86_64" }, "product_reference": "crash-7.2.8-lp152.3.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "crash-devel-7.2.8-lp152.3.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:crash-devel-7.2.8-lp152.3.2.1.x86_64" }, "product_reference": "crash-devel-7.2.8-lp152.3.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "crash-doc-7.2.8-lp152.3.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:crash-doc-7.2.8-lp152.3.2.1.x86_64" }, "product_reference": "crash-doc-7.2.8-lp152.3.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "crash-eppic-7.2.8-lp152.3.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:crash-eppic-7.2.8-lp152.3.2.1.x86_64" }, "product_reference": "crash-eppic-7.2.8-lp152.3.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "crash-gcore-7.2.8-lp152.3.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:crash-gcore-7.2.8-lp152.3.2.1.x86_64" }, "product_reference": "crash-gcore-7.2.8-lp152.3.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64" }, "product_reference": "crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64" }, "product_reference": "crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-19.11.1-lp152.2.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:dpdk-19.11.1-lp152.2.5.1.x86_64" }, "product_reference": "dpdk-19.11.1-lp152.2.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-devel-19.11.1-lp152.2.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:dpdk-devel-19.11.1-lp152.2.5.1.x86_64" }, "product_reference": "dpdk-devel-19.11.1-lp152.2.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-doc-19.11.1-lp152.2.5.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:dpdk-doc-19.11.1-lp152.2.5.1.noarch" }, "product_reference": "dpdk-doc-19.11.1-lp152.2.5.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-examples-19.11.1-lp152.2.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:dpdk-examples-19.11.1-lp152.2.5.1.x86_64" }, "product_reference": "dpdk-examples-19.11.1-lp152.2.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64" }, "product_reference": "dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64" }, "product_reference": "dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-tools-19.11.1-lp152.2.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:dpdk-tools-19.11.1-lp152.2.5.1.x86_64" }, "product_reference": "dpdk-tools-19.11.1-lp152.2.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1.x86_64" }, "product_reference": "drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64" }, "product_reference": "drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64" }, "product_reference": "drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64" }, "product_reference": "hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64" }, "product_reference": "hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-5.3.18-lp152.36.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.36.1.x86_64" }, "product_reference": "kernel-debug-5.3.18-lp152.36.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-5.3.18-lp152.36.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.36.1.x86_64" }, "product_reference": "kernel-debug-devel-5.3.18-lp152.36.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-lp152.36.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.36.1.x86_64" }, "product_reference": "kernel-default-5.3.18-lp152.36.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-lp152.36.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.36.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-lp152.36.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-lp152.36.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.36.1.noarch" }, "product_reference": "kernel-devel-5.3.18-lp152.36.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-lp152.36.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.36.1.noarch" }, "product_reference": "kernel-docs-5.3.18-lp152.36.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-5.3.18-lp152.36.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.36.1.noarch" }, "product_reference": "kernel-docs-html-5.3.18-lp152.36.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-5.3.18-lp152.36.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.36.1.x86_64" }, "product_reference": "kernel-kvmsmall-5.3.18-lp152.36.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-5.3.18-lp152.36.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.36.1.x86_64" }, "product_reference": "kernel-kvmsmall-devel-5.3.18-lp152.36.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-lp152.36.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.36.1.noarch" }, "product_reference": "kernel-macros-5.3.18-lp152.36.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-lp152.36.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.36.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-lp152.36.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-5.3.18-lp152.36.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.36.1.x86_64" }, "product_reference": "kernel-obs-qa-5.3.18-lp152.36.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-lp152.36.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.36.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-lp152.36.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-lp152.36.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.36.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-lp152.36.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-lp152.36.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.36.1.noarch" }, "product_reference": "kernel-source-5.3.18-lp152.36.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.3.18-lp152.36.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.36.1.noarch" }, "product_reference": "kernel-source-vanilla-5.3.18-lp152.36.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-lp152.36.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.36.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-lp152.36.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "libdpdk-20_0-19.11.1-lp152.2.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:libdpdk-20_0-19.11.1-lp152.2.5.1.x86_64" }, "product_reference": "libdpdk-20_0-19.11.1-lp152.2.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "mhvtl-1.62-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:mhvtl-1.62-lp152.2.2.1.x86_64" }, "product_reference": "mhvtl-1.62-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64" }, "product_reference": "mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64" }, "product_reference": "mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "openafs-1.8.5-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:openafs-1.8.5-lp152.2.2.1.x86_64" }, "product_reference": "openafs-1.8.5-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "openafs-authlibs-1.8.5-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:openafs-authlibs-1.8.5-lp152.2.2.1.x86_64" }, "product_reference": "openafs-authlibs-1.8.5-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "openafs-authlibs-devel-1.8.5-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:openafs-authlibs-devel-1.8.5-lp152.2.2.1.x86_64" }, "product_reference": "openafs-authlibs-devel-1.8.5-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "openafs-client-1.8.5-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:openafs-client-1.8.5-lp152.2.2.1.x86_64" }, "product_reference": "openafs-client-1.8.5-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "openafs-devel-1.8.5-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:openafs-devel-1.8.5-lp152.2.2.1.x86_64" }, "product_reference": "openafs-devel-1.8.5-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "openafs-fuse_client-1.8.5-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:openafs-fuse_client-1.8.5-lp152.2.2.1.x86_64" }, "product_reference": "openafs-fuse_client-1.8.5-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "openafs-kernel-source-1.8.5-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:openafs-kernel-source-1.8.5-lp152.2.2.1.x86_64" }, "product_reference": "openafs-kernel-source-1.8.5-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64" }, "product_reference": "openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64" }, "product_reference": "openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "openafs-server-1.8.5-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:openafs-server-1.8.5-lp152.2.2.1.x86_64" }, "product_reference": "openafs-server-1.8.5-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "pcfclock-0.44-lp152.4.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:pcfclock-0.44-lp152.4.2.1.x86_64" }, "product_reference": "pcfclock-0.44-lp152.4.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64" }, "product_reference": "pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64" }, "product_reference": "pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "python3-virtualbox-6.1.10-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:python3-virtualbox-6.1.10-lp152.2.2.1.x86_64" }, "product_reference": "python3-virtualbox-6.1.10-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1.x86_64" }, "product_reference": "rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64" }, "product_reference": "rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64" }, "product_reference": "rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "sysdig-0.26.5-lp152.3.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:sysdig-0.26.5-lp152.3.2.1.x86_64" }, "product_reference": "sysdig-0.26.5-lp152.3.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64" }, "product_reference": "sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64" }, "product_reference": "sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64" }, "product_reference": "v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64" }, "product_reference": "v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "v4l2loopback-utils-0.12.5-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:v4l2loopback-utils-0.12.5-lp152.2.2.1.x86_64" }, "product_reference": "v4l2loopback-utils-0.12.5-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64" }, "product_reference": "vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64" }, "product_reference": "vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-6.1.10-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:virtualbox-6.1.10-lp152.2.2.1.x86_64" }, "product_reference": "virtualbox-6.1.10-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-devel-6.1.10-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:virtualbox-devel-6.1.10-lp152.2.2.1.x86_64" }, "product_reference": "virtualbox-devel-6.1.10-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1.noarch" }, "product_reference": "virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-guest-source-6.1.10-lp152.2.2.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:virtualbox-guest-source-6.1.10-lp152.2.2.1.noarch" }, "product_reference": "virtualbox-guest-source-6.1.10-lp152.2.2.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-guest-tools-6.1.10-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:virtualbox-guest-tools-6.1.10-lp152.2.2.1.x86_64" }, "product_reference": "virtualbox-guest-tools-6.1.10-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-guest-x11-6.1.10-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:virtualbox-guest-x11-6.1.10-lp152.2.2.1.x86_64" }, "product_reference": "virtualbox-guest-x11-6.1.10-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-host-source-6.1.10-lp152.2.2.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:virtualbox-host-source-6.1.10-lp152.2.2.1.noarch" }, "product_reference": "virtualbox-host-source-6.1.10-lp152.2.2.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64" }, "product_reference": "virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64" }, "product_reference": "virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-qt-6.1.10-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:virtualbox-qt-6.1.10-lp152.2.2.1.x86_64" }, "product_reference": "virtualbox-qt-6.1.10-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-vnc-6.1.10-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:virtualbox-vnc-6.1.10-lp152.2.2.1.x86_64" }, "product_reference": "virtualbox-vnc-6.1.10-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "virtualbox-websrv-6.1.10-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:virtualbox-websrv-6.1.10-lp152.2.2.1.x86_64" }, "product_reference": "virtualbox-websrv-6.1.10-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "xtables-addons-3.9-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:xtables-addons-3.9-lp152.2.2.1.x86_64" }, "product_reference": "xtables-addons-3.9-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64" }, "product_reference": "xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64" }, "product_reference": "xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0305" } ], "notes": [ { "category": "general", "text": "In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:bbswitch-0.8-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:crash-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-devel-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-doc-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-eppic-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-gcore-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:dpdk-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-devel-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-doc-19.11.1-lp152.2.5.1.noarch", "openSUSE Leap 15.2:dpdk-examples-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-tools-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:libdpdk-20_0-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:mhvtl-1.62-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-fuse_client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kernel-source-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-server-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-0.44-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:python3-virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:sysdig-0.26.5-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-utils-0.12.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-devel-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-tools-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-x11-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-host-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-qt-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-vnc-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-websrv-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-3.9-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0305", "url": "https://www.suse.com/security/cve/CVE-2020-0305" }, { "category": "external", "summary": "SUSE Bug 1174462 for CVE-2020-0305", "url": "https://bugzilla.suse.com/1174462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:bbswitch-0.8-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:crash-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-devel-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-doc-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-eppic-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-gcore-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:dpdk-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-devel-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-doc-19.11.1-lp152.2.5.1.noarch", "openSUSE Leap 15.2:dpdk-examples-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-tools-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:libdpdk-20_0-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:mhvtl-1.62-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-fuse_client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kernel-source-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-server-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-0.44-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:python3-virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:sysdig-0.26.5-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-utils-0.12.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-devel-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-tools-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-x11-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-host-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-qt-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-vnc-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-websrv-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-3.9-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:bbswitch-0.8-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:crash-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-devel-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-doc-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-eppic-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-gcore-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:dpdk-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-devel-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-doc-19.11.1-lp152.2.5.1.noarch", "openSUSE Leap 15.2:dpdk-examples-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-tools-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:libdpdk-20_0-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:mhvtl-1.62-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-fuse_client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kernel-source-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-server-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-0.44-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:python3-virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:sysdig-0.26.5-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-utils-0.12.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-devel-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-tools-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-x11-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-host-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-qt-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-vnc-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-websrv-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-3.9-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-20T22:20:42Z", "details": "moderate" } ], "title": "CVE-2020-0305" }, { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:bbswitch-0.8-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:crash-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-devel-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-doc-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-eppic-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-gcore-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:dpdk-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-devel-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-doc-19.11.1-lp152.2.5.1.noarch", "openSUSE Leap 15.2:dpdk-examples-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-tools-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:libdpdk-20_0-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:mhvtl-1.62-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-fuse_client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kernel-source-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-server-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-0.44-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:python3-virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:sysdig-0.26.5-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-utils-0.12.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-devel-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-tools-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-x11-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-host-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-qt-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-vnc-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-websrv-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-3.9-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:bbswitch-0.8-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:crash-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-devel-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-doc-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-eppic-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-gcore-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:dpdk-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-devel-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-doc-19.11.1-lp152.2.5.1.noarch", "openSUSE Leap 15.2:dpdk-examples-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-tools-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:libdpdk-20_0-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:mhvtl-1.62-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-fuse_client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kernel-source-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-server-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-0.44-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:python3-virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:sysdig-0.26.5-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-utils-0.12.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-devel-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-tools-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-x11-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-host-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-qt-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-vnc-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-websrv-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-3.9-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:bbswitch-0.8-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:crash-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-devel-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-doc-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-eppic-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-gcore-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:dpdk-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-devel-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-doc-19.11.1-lp152.2.5.1.noarch", "openSUSE Leap 15.2:dpdk-examples-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-tools-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:libdpdk-20_0-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:mhvtl-1.62-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-fuse_client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kernel-source-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-server-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-0.44-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:python3-virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:sysdig-0.26.5-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-utils-0.12.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-devel-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-tools-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-x11-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-host-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-qt-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-vnc-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-websrv-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-3.9-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-20T22:20:42Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-10781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10781" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:bbswitch-0.8-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:crash-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-devel-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-doc-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-eppic-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-gcore-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:dpdk-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-devel-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-doc-19.11.1-lp152.2.5.1.noarch", "openSUSE Leap 15.2:dpdk-examples-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-tools-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:libdpdk-20_0-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:mhvtl-1.62-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-fuse_client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kernel-source-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-server-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-0.44-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:python3-virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:sysdig-0.26.5-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-utils-0.12.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-devel-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-tools-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-x11-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-host-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-qt-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-vnc-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-websrv-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-3.9-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10781", "url": "https://www.suse.com/security/cve/CVE-2020-10781" }, { "category": "external", "summary": "SUSE Bug 1173074 for CVE-2020-10781", "url": "https://bugzilla.suse.com/1173074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:bbswitch-0.8-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:crash-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-devel-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-doc-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-eppic-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-gcore-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:dpdk-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-devel-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-doc-19.11.1-lp152.2.5.1.noarch", "openSUSE Leap 15.2:dpdk-examples-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-tools-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:libdpdk-20_0-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:mhvtl-1.62-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-fuse_client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kernel-source-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-server-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-0.44-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:python3-virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:sysdig-0.26.5-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-utils-0.12.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-devel-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-tools-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-x11-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-host-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-qt-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-vnc-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-websrv-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-3.9-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:bbswitch-0.8-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:crash-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-devel-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-doc-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-eppic-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-gcore-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:dpdk-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-devel-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-doc-19.11.1-lp152.2.5.1.noarch", "openSUSE Leap 15.2:dpdk-examples-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-tools-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:libdpdk-20_0-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:mhvtl-1.62-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-fuse_client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kernel-source-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-server-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-0.44-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:python3-virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:sysdig-0.26.5-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-utils-0.12.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-devel-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-tools-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-x11-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-host-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-qt-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-vnc-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-websrv-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-3.9-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-20T22:20:42Z", "details": "moderate" } ], "title": "CVE-2020-10781" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:bbswitch-0.8-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:crash-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-devel-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-doc-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-eppic-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-gcore-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:dpdk-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-devel-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-doc-19.11.1-lp152.2.5.1.noarch", "openSUSE Leap 15.2:dpdk-examples-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-tools-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:libdpdk-20_0-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:mhvtl-1.62-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-fuse_client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kernel-source-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-server-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-0.44-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:python3-virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:sysdig-0.26.5-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-utils-0.12.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-devel-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-tools-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-x11-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-host-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-qt-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-vnc-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-websrv-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-3.9-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:bbswitch-0.8-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:crash-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-devel-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-doc-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-eppic-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-gcore-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:dpdk-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-devel-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-doc-19.11.1-lp152.2.5.1.noarch", "openSUSE Leap 15.2:dpdk-examples-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-tools-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:libdpdk-20_0-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:mhvtl-1.62-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-fuse_client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kernel-source-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-server-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-0.44-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:python3-virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:sysdig-0.26.5-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-utils-0.12.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-devel-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-tools-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-x11-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-host-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-qt-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-vnc-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-websrv-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-3.9-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:bbswitch-0.8-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:crash-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-devel-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-doc-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-eppic-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-gcore-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:dpdk-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-devel-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-doc-19.11.1-lp152.2.5.1.noarch", "openSUSE Leap 15.2:dpdk-examples-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-tools-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:libdpdk-20_0-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:mhvtl-1.62-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-fuse_client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kernel-source-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-server-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-0.44-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:python3-virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:sysdig-0.26.5-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-utils-0.12.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-devel-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-tools-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-x11-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-host-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-qt-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-vnc-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-websrv-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-3.9-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-20T22:20:42Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14356" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:bbswitch-0.8-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:crash-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-devel-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-doc-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-eppic-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-gcore-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:dpdk-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-devel-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-doc-19.11.1-lp152.2.5.1.noarch", "openSUSE Leap 15.2:dpdk-examples-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-tools-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:libdpdk-20_0-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:mhvtl-1.62-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-fuse_client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kernel-source-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-server-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-0.44-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:python3-virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:sysdig-0.26.5-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-utils-0.12.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-devel-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-tools-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-x11-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-host-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-qt-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-vnc-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-websrv-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-3.9-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14356", "url": "https://www.suse.com/security/cve/CVE-2020-14356" }, { "category": "external", "summary": "SUSE Bug 1175213 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1175213" }, { "category": "external", "summary": "SUSE Bug 1176392 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1176392" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:bbswitch-0.8-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:crash-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-devel-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-doc-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-eppic-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-gcore-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:dpdk-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-devel-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-doc-19.11.1-lp152.2.5.1.noarch", "openSUSE Leap 15.2:dpdk-examples-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-tools-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:libdpdk-20_0-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:mhvtl-1.62-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-fuse_client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kernel-source-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-server-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-0.44-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:python3-virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:sysdig-0.26.5-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-utils-0.12.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-devel-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-tools-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-x11-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-host-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-qt-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-vnc-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-websrv-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-3.9-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:bbswitch-0.8-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:crash-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-devel-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-doc-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-eppic-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-gcore-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:dpdk-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-devel-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-doc-19.11.1-lp152.2.5.1.noarch", "openSUSE Leap 15.2:dpdk-examples-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-tools-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:libdpdk-20_0-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:mhvtl-1.62-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-fuse_client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kernel-source-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-server-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-0.44-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:python3-virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:sysdig-0.26.5-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-utils-0.12.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-devel-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-tools-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-x11-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-host-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-qt-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-vnc-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-websrv-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-3.9-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-20T22:20:42Z", "details": "moderate" } ], "title": "CVE-2020-14356" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:bbswitch-0.8-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:crash-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-devel-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-doc-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-eppic-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-gcore-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:dpdk-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-devel-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-doc-19.11.1-lp152.2.5.1.noarch", "openSUSE Leap 15.2:dpdk-examples-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-tools-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:libdpdk-20_0-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:mhvtl-1.62-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-fuse_client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kernel-source-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-server-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-0.44-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:python3-virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:sysdig-0.26.5-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-utils-0.12.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-devel-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-tools-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-x11-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-host-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-qt-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-vnc-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-websrv-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-3.9-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:bbswitch-0.8-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:crash-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-devel-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-doc-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-eppic-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-gcore-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:dpdk-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-devel-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-doc-19.11.1-lp152.2.5.1.noarch", "openSUSE Leap 15.2:dpdk-examples-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-tools-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:libdpdk-20_0-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:mhvtl-1.62-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-fuse_client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kernel-source-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-server-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-0.44-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:python3-virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:sysdig-0.26.5-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-utils-0.12.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-devel-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-tools-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-x11-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-host-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-qt-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-vnc-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-websrv-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-3.9-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:bbswitch-0.8-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:crash-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-devel-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-doc-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-eppic-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-gcore-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:dpdk-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-devel-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-doc-19.11.1-lp152.2.5.1.noarch", "openSUSE Leap 15.2:dpdk-examples-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-tools-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:libdpdk-20_0-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:mhvtl-1.62-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-fuse_client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kernel-source-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-server-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-0.44-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:python3-virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:sysdig-0.26.5-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-utils-0.12.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-devel-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-tools-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-x11-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-host-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-qt-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-vnc-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-websrv-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-3.9-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-20T22:20:42Z", "details": "important" } ], "title": "CVE-2020-15780" }, { "cve": "CVE-2020-16166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16166" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:bbswitch-0.8-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:crash-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-devel-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-doc-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-eppic-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-gcore-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:dpdk-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-devel-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-doc-19.11.1-lp152.2.5.1.noarch", "openSUSE Leap 15.2:dpdk-examples-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-tools-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:libdpdk-20_0-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:mhvtl-1.62-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-fuse_client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kernel-source-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-server-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-0.44-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:python3-virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:sysdig-0.26.5-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-utils-0.12.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-devel-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-tools-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-x11-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-host-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-qt-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-vnc-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-websrv-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-3.9-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16166", "url": "https://www.suse.com/security/cve/CVE-2020-16166" }, { "category": "external", "summary": "SUSE Bug 1174757 for CVE-2020-16166", "url": "https://bugzilla.suse.com/1174757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:bbswitch-0.8-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:crash-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-devel-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-doc-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-eppic-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-gcore-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:dpdk-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-devel-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-doc-19.11.1-lp152.2.5.1.noarch", "openSUSE Leap 15.2:dpdk-examples-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-tools-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:libdpdk-20_0-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:mhvtl-1.62-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-fuse_client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kernel-source-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-server-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-0.44-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:python3-virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:sysdig-0.26.5-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-utils-0.12.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-devel-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-tools-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-x11-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-host-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-qt-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-vnc-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-websrv-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-3.9-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:bbswitch-0.8-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:crash-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-devel-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-doc-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-eppic-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-gcore-7.2.8-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:dpdk-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-devel-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-doc-19.11.1-lp152.2.5.1.noarch", "openSUSE Leap 15.2:dpdk-examples-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:dpdk-tools-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1.x86_64", "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.36.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.36.1.x86_64", "openSUSE Leap 15.2:libdpdk-20_0-19.11.1-lp152.2.5.1.x86_64", "openSUSE Leap 15.2:mhvtl-1.62-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-authlibs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-devel-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-fuse_client-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kernel-source-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:openafs-server-1.8.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-0.44-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1.x86_64", "openSUSE Leap 15.2:python3-virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:sysdig-0.26.5-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:v4l2loopback-utils-0.12.5-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-devel-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-guest-tools-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-guest-x11-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-host-source-6.1.10-lp152.2.2.1.noarch", "openSUSE Leap 15.2:virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-qt-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-vnc-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:virtualbox-websrv-6.1.10-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-3.9-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64", "openSUSE Leap 15.2:xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-20T22:20:42Z", "details": "moderate" } ], "title": "CVE-2020-16166" } ] }
opensuse-su-2021:0242-1
Vulnerability from csaf_opensuse
Published
2021-02-05 15:16
Modified
2021-02-05 15:16
Summary
Security update for RT kernel
Notes
Title of the patch
Security update for RT kernel
Description of the patch
This update syncs the RT kernel from the SUSE Linux Enterprise 15-SP2 codestream.
This update was imported from the SUSE:SLE-15-SP2:Update update project.
Patchnames
openSUSE-2021-242
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for RT kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update syncs the RT kernel from the SUSE Linux Enterprise 15-SP2 codestream.\n \nThis update was imported from the SUSE:SLE-15-SP2:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2021-242", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_0242-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2021:0242-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2021:0242-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" }, { "category": "self", "summary": "SUSE Bug 1034995", "url": "https://bugzilla.suse.com/1034995" }, { "category": "self", "summary": "SUSE Bug 1040855", "url": "https://bugzilla.suse.com/1040855" }, { "category": "self", "summary": "SUSE Bug 1043347", "url": "https://bugzilla.suse.com/1043347" }, { "category": "self", "summary": "SUSE Bug 1044120", "url": "https://bugzilla.suse.com/1044120" }, { "category": "self", "summary": "SUSE Bug 1044767", "url": "https://bugzilla.suse.com/1044767" }, { "category": "self", "summary": "SUSE Bug 1055014", "url": "https://bugzilla.suse.com/1055014" }, { "category": "self", "summary": "SUSE Bug 1055117", "url": "https://bugzilla.suse.com/1055117" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1061843", "url": "https://bugzilla.suse.com/1061843" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1066382", "url": "https://bugzilla.suse.com/1066382" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1077428", "url": "https://bugzilla.suse.com/1077428" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1094244", "url": "https://bugzilla.suse.com/1094244" }, { "category": "self", "summary": "SUSE Bug 1094840", "url": "https://bugzilla.suse.com/1094840" }, { "category": "self", "summary": "SUSE Bug 1109695", "url": "https://bugzilla.suse.com/1109695" }, { "category": "self", "summary": "SUSE Bug 1115431", "url": "https://bugzilla.suse.com/1115431" }, { "category": "self", "summary": "SUSE Bug 1120163", "url": "https://bugzilla.suse.com/1120163" }, { "category": "self", "summary": "SUSE Bug 1129923", "url": "https://bugzilla.suse.com/1129923" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1134760", "url": "https://bugzilla.suse.com/1134760" }, { "category": "self", "summary": "SUSE Bug 1136666", "url": "https://bugzilla.suse.com/1136666" }, { "category": "self", "summary": "SUSE Bug 1138374", "url": "https://bugzilla.suse.com/1138374" }, { "category": "self", "summary": "SUSE Bug 1139944", "url": "https://bugzilla.suse.com/1139944" }, { "category": "self", "summary": "SUSE Bug 1148868", "url": "https://bugzilla.suse.com/1148868" }, { "category": "self", "summary": "SUSE Bug 1149032", "url": "https://bugzilla.suse.com/1149032" }, { "category": "self", "summary": "SUSE Bug 1152148", "url": "https://bugzilla.suse.com/1152148" }, { "category": "self", "summary": "SUSE Bug 1152457", "url": "https://bugzilla.suse.com/1152457" }, { "category": "self", "summary": "SUSE Bug 1152472", "url": "https://bugzilla.suse.com/1152472" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1153274", "url": "https://bugzilla.suse.com/1153274" }, { "category": "self", "summary": "SUSE Bug 1154353", "url": "https://bugzilla.suse.com/1154353" }, { "category": "self", "summary": "SUSE Bug 1154488", "url": "https://bugzilla.suse.com/1154488" }, { "category": "self", "summary": "SUSE Bug 1154492", "url": "https://bugzilla.suse.com/1154492" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1155518", "url": "https://bugzilla.suse.com/1155518" }, { "category": "self", "summary": "SUSE Bug 1155798", "url": "https://bugzilla.suse.com/1155798" }, { "category": "self", "summary": "SUSE Bug 1156315", "url": "https://bugzilla.suse.com/1156315" }, { "category": "self", "summary": "SUSE Bug 1156395", "url": "https://bugzilla.suse.com/1156395" }, { "category": "self", "summary": "SUSE Bug 1157169", "url": "https://bugzilla.suse.com/1157169" }, { "category": "self", "summary": "SUSE Bug 1158050", "url": "https://bugzilla.suse.com/1158050" }, { "category": "self", "summary": "SUSE Bug 1158242", "url": "https://bugzilla.suse.com/1158242" }, { "category": "self", "summary": "SUSE Bug 1158265", "url": "https://bugzilla.suse.com/1158265" }, { "category": "self", "summary": "SUSE Bug 1158748", "url": "https://bugzilla.suse.com/1158748" }, { "category": "self", "summary": "SUSE Bug 1158765", "url": "https://bugzilla.suse.com/1158765" }, { "category": "self", "summary": "SUSE Bug 1158775", "url": "https://bugzilla.suse.com/1158775" }, { "category": "self", "summary": "SUSE Bug 1158983", "url": "https://bugzilla.suse.com/1158983" }, { "category": "self", "summary": "SUSE Bug 1159058", "url": "https://bugzilla.suse.com/1159058" }, { "category": "self", "summary": "SUSE Bug 1159781", "url": "https://bugzilla.suse.com/1159781" }, { "category": "self", "summary": "SUSE Bug 1159867", "url": "https://bugzilla.suse.com/1159867" }, { "category": "self", "summary": "SUSE Bug 1159886", "url": "https://bugzilla.suse.com/1159886" }, { "category": "self", "summary": "SUSE Bug 1160388", "url": "https://bugzilla.suse.com/1160388" }, { "category": "self", "summary": "SUSE Bug 1160634", "url": "https://bugzilla.suse.com/1160634" }, { "category": "self", "summary": "SUSE Bug 1160947", "url": "https://bugzilla.suse.com/1160947" }, { "category": "self", "summary": "SUSE Bug 1161099", "url": "https://bugzilla.suse.com/1161099" }, { "category": "self", "summary": "SUSE Bug 1161495", "url": "https://bugzilla.suse.com/1161495" }, { "category": "self", "summary": "SUSE Bug 1162002", "url": "https://bugzilla.suse.com/1162002" }, { "category": "self", "summary": "SUSE Bug 1162063", "url": "https://bugzilla.suse.com/1162063" }, { "category": "self", "summary": "SUSE Bug 1162209", "url": "https://bugzilla.suse.com/1162209" }, { "category": "self", "summary": "SUSE Bug 1162400", "url": "https://bugzilla.suse.com/1162400" }, { "category": "self", "summary": "SUSE Bug 1162702", "url": "https://bugzilla.suse.com/1162702" }, { "category": "self", "summary": "SUSE Bug 1163592", "url": "https://bugzilla.suse.com/1163592" }, { "category": "self", "summary": "SUSE Bug 1163727", "url": "https://bugzilla.suse.com/1163727" }, { "category": "self", "summary": "SUSE Bug 1164648", "url": "https://bugzilla.suse.com/1164648" }, { "category": "self", "summary": "SUSE Bug 1164777", "url": "https://bugzilla.suse.com/1164777" }, { "category": "self", "summary": "SUSE Bug 1164780", "url": "https://bugzilla.suse.com/1164780" }, { "category": "self", "summary": "SUSE Bug 1165211", "url": "https://bugzilla.suse.com/1165211" }, { "category": "self", "summary": "SUSE Bug 1165455", "url": "https://bugzilla.suse.com/1165455" }, { "category": "self", "summary": "SUSE Bug 1165629", "url": "https://bugzilla.suse.com/1165629" }, { "category": "self", "summary": "SUSE Bug 1165692", "url": "https://bugzilla.suse.com/1165692" }, { "category": "self", "summary": "SUSE Bug 1165933", "url": "https://bugzilla.suse.com/1165933" }, { "category": "self", "summary": "SUSE Bug 1165975", "url": "https://bugzilla.suse.com/1165975" }, { "category": "self", "summary": "SUSE Bug 1166146", "url": "https://bugzilla.suse.com/1166146" }, { "category": "self", "summary": "SUSE Bug 1166166", "url": "https://bugzilla.suse.com/1166166" }, { "category": "self", "summary": "SUSE Bug 1166340", "url": "https://bugzilla.suse.com/1166340" }, { "category": "self", "summary": "SUSE Bug 1166965", "url": "https://bugzilla.suse.com/1166965" }, { "category": "self", "summary": "SUSE Bug 1166985", "url": "https://bugzilla.suse.com/1166985" }, { "category": "self", "summary": "SUSE Bug 1167030", "url": "https://bugzilla.suse.com/1167030" }, { "category": "self", "summary": "SUSE Bug 1167104", "url": "https://bugzilla.suse.com/1167104" }, { "category": "self", "summary": "SUSE Bug 1167527", "url": "https://bugzilla.suse.com/1167527" }, { "category": "self", "summary": "SUSE Bug 1167651", "url": "https://bugzilla.suse.com/1167651" }, { "category": "self", "summary": "SUSE Bug 1167657", "url": "https://bugzilla.suse.com/1167657" }, { "category": "self", "summary": "SUSE Bug 1167773", "url": "https://bugzilla.suse.com/1167773" }, { "category": "self", "summary": "SUSE Bug 1167851", "url": "https://bugzilla.suse.com/1167851" }, { "category": "self", "summary": "SUSE Bug 1168230", "url": "https://bugzilla.suse.com/1168230" }, { "category": "self", "summary": "SUSE Bug 1168461", "url": "https://bugzilla.suse.com/1168461" }, { "category": "self", "summary": "SUSE Bug 1168468", "url": "https://bugzilla.suse.com/1168468" }, { "category": "self", "summary": "SUSE Bug 1168779", "url": "https://bugzilla.suse.com/1168779" }, { "category": "self", "summary": "SUSE Bug 1168838", "url": "https://bugzilla.suse.com/1168838" }, { "category": "self", "summary": "SUSE Bug 1168952", "url": "https://bugzilla.suse.com/1168952" }, { "category": "self", "summary": "SUSE Bug 1168959", "url": "https://bugzilla.suse.com/1168959" }, { "category": "self", "summary": "SUSE Bug 1169021", "url": "https://bugzilla.suse.com/1169021" }, { "category": "self", "summary": "SUSE Bug 1169094", "url": "https://bugzilla.suse.com/1169094" }, { "category": "self", "summary": "SUSE Bug 1169194", "url": "https://bugzilla.suse.com/1169194" }, { "category": "self", "summary": "SUSE Bug 1169263", "url": "https://bugzilla.suse.com/1169263" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169681", "url": "https://bugzilla.suse.com/1169681" }, { "category": "self", "summary": "SUSE Bug 1169763", "url": "https://bugzilla.suse.com/1169763" }, { "category": "self", "summary": "SUSE Bug 1169771", "url": "https://bugzilla.suse.com/1169771" }, { "category": "self", "summary": "SUSE Bug 1169790", "url": "https://bugzilla.suse.com/1169790" }, { "category": "self", "summary": "SUSE Bug 1169795", "url": "https://bugzilla.suse.com/1169795" }, { "category": "self", "summary": "SUSE Bug 1170011", "url": "https://bugzilla.suse.com/1170011" }, { "category": "self", "summary": "SUSE Bug 1170139", "url": "https://bugzilla.suse.com/1170139" }, { "category": "self", "summary": "SUSE Bug 1170232", "url": "https://bugzilla.suse.com/1170232" }, { "category": "self", "summary": "SUSE Bug 1170284", "url": "https://bugzilla.suse.com/1170284" }, { "category": "self", "summary": "SUSE Bug 1170415", "url": "https://bugzilla.suse.com/1170415" }, { "category": "self", "summary": "SUSE Bug 1170442", "url": "https://bugzilla.suse.com/1170442" }, { "category": "self", "summary": "SUSE Bug 1170617", "url": "https://bugzilla.suse.com/1170617" }, { "category": "self", "summary": "SUSE Bug 1170621", "url": "https://bugzilla.suse.com/1170621" }, { "category": "self", "summary": "SUSE Bug 1170774", "url": "https://bugzilla.suse.com/1170774" }, { "category": "self", "summary": "SUSE Bug 1170879", "url": "https://bugzilla.suse.com/1170879" }, { "category": "self", "summary": "SUSE Bug 1170891", "url": "https://bugzilla.suse.com/1170891" }, { "category": "self", "summary": "SUSE Bug 1170895", "url": "https://bugzilla.suse.com/1170895" }, { "category": "self", "summary": "SUSE Bug 1171000", "url": "https://bugzilla.suse.com/1171000" }, { "category": "self", "summary": "SUSE Bug 1171068", "url": "https://bugzilla.suse.com/1171068" }, { "category": "self", "summary": "SUSE Bug 1171073", "url": "https://bugzilla.suse.com/1171073" }, { "category": "self", "summary": "SUSE Bug 1171078", "url": "https://bugzilla.suse.com/1171078" }, { "category": "self", "summary": "SUSE Bug 1171117", "url": "https://bugzilla.suse.com/1171117" }, { "category": "self", "summary": "SUSE Bug 1171150", "url": "https://bugzilla.suse.com/1171150" }, { "category": "self", "summary": "SUSE Bug 1171156", "url": "https://bugzilla.suse.com/1171156" }, { "category": "self", "summary": "SUSE Bug 1171189", "url": "https://bugzilla.suse.com/1171189" }, { "category": "self", "summary": "SUSE Bug 1171191", "url": "https://bugzilla.suse.com/1171191" }, { "category": "self", "summary": "SUSE Bug 1171218", "url": "https://bugzilla.suse.com/1171218" }, { "category": "self", "summary": "SUSE Bug 1171219", "url": "https://bugzilla.suse.com/1171219" }, { "category": "self", "summary": "SUSE Bug 1171220", "url": "https://bugzilla.suse.com/1171220" }, { "category": "self", "summary": "SUSE Bug 1171236", "url": "https://bugzilla.suse.com/1171236" }, { "category": "self", "summary": "SUSE Bug 1171242", "url": "https://bugzilla.suse.com/1171242" }, { "category": "self", "summary": "SUSE Bug 1171246", "url": "https://bugzilla.suse.com/1171246" }, { "category": "self", "summary": "SUSE Bug 1171285", "url": "https://bugzilla.suse.com/1171285" }, { "category": "self", "summary": "SUSE Bug 1171293", "url": "https://bugzilla.suse.com/1171293" }, { "category": "self", "summary": "SUSE Bug 1171374", "url": "https://bugzilla.suse.com/1171374" }, { "category": "self", "summary": "SUSE Bug 1171390", "url": "https://bugzilla.suse.com/1171390" }, { "category": "self", "summary": "SUSE Bug 1171391", "url": "https://bugzilla.suse.com/1171391" }, { "category": "self", "summary": "SUSE Bug 1171392", "url": "https://bugzilla.suse.com/1171392" }, { "category": "self", "summary": "SUSE Bug 1171417", "url": "https://bugzilla.suse.com/1171417" }, { "category": "self", "summary": "SUSE Bug 1171426", "url": "https://bugzilla.suse.com/1171426" }, { "category": "self", "summary": "SUSE Bug 1171507", "url": "https://bugzilla.suse.com/1171507" }, { "category": "self", "summary": "SUSE Bug 1171513", "url": "https://bugzilla.suse.com/1171513" }, { "category": "self", "summary": "SUSE Bug 1171514", "url": "https://bugzilla.suse.com/1171514" }, { "category": "self", "summary": "SUSE Bug 1171529", "url": "https://bugzilla.suse.com/1171529" }, { "category": "self", "summary": "SUSE Bug 1171530", "url": "https://bugzilla.suse.com/1171530" }, { "category": "self", "summary": "SUSE Bug 1171558", "url": "https://bugzilla.suse.com/1171558" }, { "category": "self", "summary": "SUSE Bug 1171634", "url": "https://bugzilla.suse.com/1171634" }, { "category": "self", "summary": "SUSE Bug 1171644", "url": "https://bugzilla.suse.com/1171644" }, { "category": "self", "summary": "SUSE Bug 1171662", "url": "https://bugzilla.suse.com/1171662" }, { "category": "self", "summary": "SUSE Bug 1171675", "url": "https://bugzilla.suse.com/1171675" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1171699", "url": "https://bugzilla.suse.com/1171699" }, { "category": "self", "summary": "SUSE Bug 1171709", "url": "https://bugzilla.suse.com/1171709" }, { "category": "self", "summary": "SUSE Bug 1171730", "url": "https://bugzilla.suse.com/1171730" }, { "category": "self", "summary": "SUSE Bug 1171732", "url": "https://bugzilla.suse.com/1171732" }, { "category": "self", "summary": "SUSE Bug 1171736", "url": "https://bugzilla.suse.com/1171736" }, { "category": "self", "summary": "SUSE Bug 1171739", "url": "https://bugzilla.suse.com/1171739" }, { "category": "self", "summary": "SUSE Bug 1171742", "url": "https://bugzilla.suse.com/1171742" }, { "category": "self", "summary": "SUSE Bug 1171743", "url": "https://bugzilla.suse.com/1171743" }, { "category": "self", "summary": "SUSE Bug 1171759", "url": "https://bugzilla.suse.com/1171759" }, { "category": "self", "summary": "SUSE Bug 1171773", "url": "https://bugzilla.suse.com/1171773" }, { "category": "self", "summary": "SUSE Bug 1171774", "url": "https://bugzilla.suse.com/1171774" }, { "category": "self", "summary": "SUSE Bug 1171775", "url": "https://bugzilla.suse.com/1171775" }, { "category": "self", "summary": "SUSE Bug 1171776", "url": "https://bugzilla.suse.com/1171776" }, { "category": "self", "summary": "SUSE Bug 1171777", "url": "https://bugzilla.suse.com/1171777" }, { "category": "self", "summary": "SUSE Bug 1171778", "url": "https://bugzilla.suse.com/1171778" }, { "category": "self", "summary": "SUSE Bug 1171779", "url": "https://bugzilla.suse.com/1171779" }, { "category": "self", "summary": "SUSE Bug 1171780", "url": "https://bugzilla.suse.com/1171780" }, { "category": "self", "summary": "SUSE Bug 1171781", "url": "https://bugzilla.suse.com/1171781" }, { "category": "self", "summary": "SUSE Bug 1171782", "url": "https://bugzilla.suse.com/1171782" }, { "category": "self", "summary": "SUSE Bug 1171783", "url": "https://bugzilla.suse.com/1171783" }, { "category": "self", "summary": "SUSE Bug 1171784", "url": "https://bugzilla.suse.com/1171784" }, { "category": "self", "summary": "SUSE Bug 1171785", "url": "https://bugzilla.suse.com/1171785" }, { "category": "self", "summary": "SUSE Bug 1171786", "url": "https://bugzilla.suse.com/1171786" }, { "category": "self", "summary": "SUSE Bug 1171787", "url": "https://bugzilla.suse.com/1171787" }, { "category": "self", "summary": "SUSE Bug 1171788", "url": "https://bugzilla.suse.com/1171788" }, { "category": "self", "summary": "SUSE Bug 1171789", "url": "https://bugzilla.suse.com/1171789" }, { "category": "self", "summary": "SUSE Bug 1171790", "url": "https://bugzilla.suse.com/1171790" }, { "category": "self", "summary": "SUSE Bug 1171791", "url": "https://bugzilla.suse.com/1171791" }, { "category": "self", "summary": "SUSE Bug 1171792", "url": "https://bugzilla.suse.com/1171792" }, { "category": "self", "summary": "SUSE Bug 1171793", "url": "https://bugzilla.suse.com/1171793" }, { "category": "self", "summary": "SUSE Bug 1171794", "url": "https://bugzilla.suse.com/1171794" }, { "category": "self", "summary": "SUSE Bug 1171795", "url": "https://bugzilla.suse.com/1171795" }, { "category": "self", "summary": "SUSE Bug 1171796", "url": "https://bugzilla.suse.com/1171796" }, { "category": "self", "summary": "SUSE Bug 1171797", "url": "https://bugzilla.suse.com/1171797" }, { "category": "self", "summary": "SUSE Bug 1171798", "url": "https://bugzilla.suse.com/1171798" }, { "category": "self", "summary": "SUSE Bug 1171799", "url": "https://bugzilla.suse.com/1171799" }, { "category": "self", "summary": "SUSE Bug 1171810", "url": "https://bugzilla.suse.com/1171810" }, { "category": "self", "summary": "SUSE Bug 1171827", "url": "https://bugzilla.suse.com/1171827" }, { "category": "self", "summary": "SUSE Bug 1171828", "url": "https://bugzilla.suse.com/1171828" }, { "category": "self", "summary": "SUSE Bug 1171832", "url": "https://bugzilla.suse.com/1171832" }, { "category": "self", "summary": "SUSE Bug 1171833", "url": "https://bugzilla.suse.com/1171833" }, { "category": "self", "summary": "SUSE Bug 1171834", "url": "https://bugzilla.suse.com/1171834" }, { "category": "self", "summary": "SUSE Bug 1171835", "url": "https://bugzilla.suse.com/1171835" }, { "category": "self", "summary": "SUSE Bug 1171839", "url": "https://bugzilla.suse.com/1171839" }, { "category": "self", "summary": "SUSE Bug 1171840", "url": "https://bugzilla.suse.com/1171840" }, { "category": "self", "summary": "SUSE Bug 1171841", "url": "https://bugzilla.suse.com/1171841" }, { "category": "self", "summary": "SUSE Bug 1171842", "url": "https://bugzilla.suse.com/1171842" }, { "category": "self", "summary": "SUSE Bug 1171843", "url": "https://bugzilla.suse.com/1171843" }, { "category": "self", "summary": "SUSE Bug 1171844", "url": "https://bugzilla.suse.com/1171844" }, { "category": "self", "summary": "SUSE Bug 1171849", "url": "https://bugzilla.suse.com/1171849" }, { "category": "self", "summary": "SUSE Bug 1171857", "url": "https://bugzilla.suse.com/1171857" }, { "category": "self", "summary": "SUSE Bug 1171868", "url": "https://bugzilla.suse.com/1171868" }, { "category": "self", "summary": "SUSE Bug 1171904", "url": "https://bugzilla.suse.com/1171904" }, { "category": "self", "summary": "SUSE Bug 1171915", "url": "https://bugzilla.suse.com/1171915" }, { "category": "self", "summary": "SUSE Bug 1171982", "url": "https://bugzilla.suse.com/1171982" }, { "category": "self", "summary": "SUSE Bug 1171983", "url": "https://bugzilla.suse.com/1171983" }, { "category": "self", "summary": "SUSE Bug 1171988", "url": "https://bugzilla.suse.com/1171988" }, { "category": "self", "summary": "SUSE Bug 1172017", "url": "https://bugzilla.suse.com/1172017" }, { "category": "self", "summary": "SUSE Bug 1172046", "url": "https://bugzilla.suse.com/1172046" }, { "category": "self", "summary": "SUSE Bug 1172061", "url": "https://bugzilla.suse.com/1172061" }, { "category": "self", "summary": "SUSE Bug 1172062", "url": "https://bugzilla.suse.com/1172062" }, { "category": "self", "summary": "SUSE Bug 1172063", "url": "https://bugzilla.suse.com/1172063" }, { "category": "self", "summary": "SUSE Bug 1172064", "url": "https://bugzilla.suse.com/1172064" }, { "category": "self", "summary": "SUSE Bug 1172065", "url": "https://bugzilla.suse.com/1172065" }, { "category": "self", "summary": "SUSE Bug 1172066", "url": "https://bugzilla.suse.com/1172066" }, { "category": "self", "summary": "SUSE Bug 1172067", "url": "https://bugzilla.suse.com/1172067" }, { "category": "self", "summary": "SUSE Bug 1172068", "url": "https://bugzilla.suse.com/1172068" }, { "category": "self", "summary": "SUSE Bug 1172069", "url": "https://bugzilla.suse.com/1172069" }, { "category": "self", "summary": "SUSE Bug 1172073", "url": "https://bugzilla.suse.com/1172073" }, { "category": "self", "summary": "SUSE Bug 1172086", "url": "https://bugzilla.suse.com/1172086" }, { "category": "self", "summary": "SUSE Bug 1172095", "url": "https://bugzilla.suse.com/1172095" }, { "category": "self", "summary": "SUSE Bug 1172108", "url": "https://bugzilla.suse.com/1172108" }, { "category": "self", "summary": "SUSE Bug 1172145", "url": "https://bugzilla.suse.com/1172145" }, { "category": "self", "summary": "SUSE Bug 1172169", "url": "https://bugzilla.suse.com/1172169" }, { "category": "self", "summary": "SUSE Bug 1172170", "url": "https://bugzilla.suse.com/1172170" }, { "category": "self", "summary": "SUSE Bug 1172197", "url": "https://bugzilla.suse.com/1172197" }, { "category": "self", "summary": "SUSE Bug 1172201", "url": "https://bugzilla.suse.com/1172201" }, { "category": "self", "summary": "SUSE Bug 1172208", "url": "https://bugzilla.suse.com/1172208" }, { "category": "self", "summary": "SUSE Bug 1172223", "url": "https://bugzilla.suse.com/1172223" }, { "category": "self", "summary": "SUSE Bug 1172247", "url": "https://bugzilla.suse.com/1172247" }, { "category": "self", "summary": "SUSE Bug 1172317", "url": "https://bugzilla.suse.com/1172317" }, { "category": "self", "summary": "SUSE Bug 1172342", "url": "https://bugzilla.suse.com/1172342" }, { "category": "self", "summary": "SUSE Bug 1172343", "url": "https://bugzilla.suse.com/1172343" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172365", "url": "https://bugzilla.suse.com/1172365" }, { "category": "self", "summary": "SUSE Bug 1172366", "url": "https://bugzilla.suse.com/1172366" }, { "category": "self", "summary": "SUSE Bug 1172374", "url": "https://bugzilla.suse.com/1172374" }, { "category": "self", "summary": "SUSE Bug 1172391", "url": "https://bugzilla.suse.com/1172391" }, { "category": "self", "summary": "SUSE Bug 1172393", "url": "https://bugzilla.suse.com/1172393" }, { "category": "self", "summary": "SUSE Bug 1172394", "url": "https://bugzilla.suse.com/1172394" }, { "category": "self", "summary": "SUSE Bug 1172418", "url": "https://bugzilla.suse.com/1172418" }, { "category": "self", "summary": "SUSE Bug 1172419", "url": "https://bugzilla.suse.com/1172419" }, { "category": "self", "summary": "SUSE Bug 1172453", "url": "https://bugzilla.suse.com/1172453" }, { "category": "self", "summary": "SUSE Bug 1172458", "url": "https://bugzilla.suse.com/1172458" }, { "category": "self", "summary": "SUSE Bug 1172467", "url": "https://bugzilla.suse.com/1172467" }, { "category": "self", "summary": "SUSE Bug 1172484", "url": "https://bugzilla.suse.com/1172484" }, { "category": "self", "summary": "SUSE Bug 1172537", "url": "https://bugzilla.suse.com/1172537" }, { "category": "self", "summary": "SUSE Bug 1172543", "url": "https://bugzilla.suse.com/1172543" }, { "category": "self", "summary": "SUSE Bug 1172687", "url": "https://bugzilla.suse.com/1172687" }, { "category": "self", "summary": "SUSE Bug 1172719", "url": "https://bugzilla.suse.com/1172719" }, { "category": "self", "summary": "SUSE Bug 1172733", "url": "https://bugzilla.suse.com/1172733" }, { "category": "self", "summary": "SUSE Bug 1172739", "url": "https://bugzilla.suse.com/1172739" }, { "category": "self", "summary": "SUSE Bug 1172751", "url": "https://bugzilla.suse.com/1172751" }, { "category": "self", "summary": "SUSE Bug 1172757", "url": "https://bugzilla.suse.com/1172757" }, { "category": "self", "summary": "SUSE Bug 1172759", "url": "https://bugzilla.suse.com/1172759" }, { "category": "self", "summary": "SUSE Bug 1172775", "url": "https://bugzilla.suse.com/1172775" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172814", "url": "https://bugzilla.suse.com/1172814" }, { "category": "self", "summary": "SUSE Bug 1172823", "url": "https://bugzilla.suse.com/1172823" }, { "category": "self", "summary": "SUSE Bug 1172841", "url": "https://bugzilla.suse.com/1172841" }, { "category": "self", "summary": "SUSE Bug 1172871", "url": "https://bugzilla.suse.com/1172871" }, { "category": "self", "summary": "SUSE Bug 1172873", "url": "https://bugzilla.suse.com/1172873" }, { "category": "self", "summary": "SUSE Bug 1172938", "url": "https://bugzilla.suse.com/1172938" }, { "category": "self", "summary": "SUSE Bug 1172939", "url": "https://bugzilla.suse.com/1172939" }, { "category": "self", "summary": "SUSE Bug 1172940", "url": "https://bugzilla.suse.com/1172940" }, { "category": "self", "summary": "SUSE Bug 1172956", "url": "https://bugzilla.suse.com/1172956" }, { "category": "self", "summary": "SUSE Bug 1172963", "url": "https://bugzilla.suse.com/1172963" }, { "category": "self", "summary": "SUSE Bug 1172983", "url": "https://bugzilla.suse.com/1172983" }, { "category": "self", "summary": "SUSE Bug 1172984", "url": "https://bugzilla.suse.com/1172984" }, { "category": "self", "summary": "SUSE Bug 1172985", "url": "https://bugzilla.suse.com/1172985" }, { "category": "self", "summary": "SUSE Bug 1172986", "url": "https://bugzilla.suse.com/1172986" }, { "category": "self", "summary": "SUSE Bug 1172987", "url": "https://bugzilla.suse.com/1172987" }, { "category": "self", "summary": "SUSE Bug 1172988", "url": "https://bugzilla.suse.com/1172988" }, { "category": "self", "summary": "SUSE Bug 1172989", "url": "https://bugzilla.suse.com/1172989" }, { "category": "self", "summary": "SUSE Bug 1172990", "url": "https://bugzilla.suse.com/1172990" }, { "category": "self", "summary": "SUSE Bug 1172999", "url": "https://bugzilla.suse.com/1172999" }, { "category": "self", "summary": "SUSE Bug 1173017", "url": "https://bugzilla.suse.com/1173017" }, { "category": "self", "summary": "SUSE Bug 1173068", "url": "https://bugzilla.suse.com/1173068" }, { "category": "self", "summary": "SUSE Bug 1173074", "url": "https://bugzilla.suse.com/1173074" }, { "category": "self", "summary": "SUSE Bug 1173085", "url": "https://bugzilla.suse.com/1173085" }, { "category": "self", "summary": "SUSE Bug 1173115", "url": "https://bugzilla.suse.com/1173115" }, { "category": "self", "summary": "SUSE Bug 1173139", "url": "https://bugzilla.suse.com/1173139" }, { "category": "self", "summary": "SUSE Bug 1173206", "url": "https://bugzilla.suse.com/1173206" }, { "category": "self", "summary": "SUSE Bug 1173267", "url": "https://bugzilla.suse.com/1173267" }, { "category": "self", "summary": "SUSE Bug 1173271", "url": "https://bugzilla.suse.com/1173271" }, { "category": "self", "summary": "SUSE Bug 1173280", "url": "https://bugzilla.suse.com/1173280" }, { "category": "self", "summary": "SUSE Bug 1173284", "url": "https://bugzilla.suse.com/1173284" }, { "category": "self", "summary": "SUSE Bug 1173428", "url": "https://bugzilla.suse.com/1173428" }, { "category": "self", "summary": "SUSE Bug 1173438", "url": "https://bugzilla.suse.com/1173438" }, { "category": "self", "summary": "SUSE Bug 1173461", "url": "https://bugzilla.suse.com/1173461" }, { "category": "self", "summary": "SUSE Bug 1173468", "url": "https://bugzilla.suse.com/1173468" }, { "category": "self", "summary": "SUSE Bug 1173485", "url": "https://bugzilla.suse.com/1173485" }, { "category": "self", "summary": "SUSE Bug 1173514", "url": "https://bugzilla.suse.com/1173514" }, { "category": "self", "summary": "SUSE Bug 1173552", "url": "https://bugzilla.suse.com/1173552" }, { "category": "self", "summary": "SUSE Bug 1173573", "url": "https://bugzilla.suse.com/1173573" }, { "category": "self", "summary": "SUSE Bug 1173625", "url": "https://bugzilla.suse.com/1173625" }, { "category": "self", "summary": "SUSE Bug 1173746", "url": "https://bugzilla.suse.com/1173746" }, { "category": "self", "summary": "SUSE Bug 1173776", "url": "https://bugzilla.suse.com/1173776" }, { "category": "self", "summary": "SUSE Bug 1173798", "url": "https://bugzilla.suse.com/1173798" }, { "category": "self", "summary": "SUSE Bug 1173813", "url": "https://bugzilla.suse.com/1173813" }, { "category": "self", "summary": "SUSE Bug 1173817", "url": "https://bugzilla.suse.com/1173817" }, { "category": "self", "summary": "SUSE Bug 1173818", "url": "https://bugzilla.suse.com/1173818" }, { "category": "self", "summary": "SUSE Bug 1173820", "url": "https://bugzilla.suse.com/1173820" }, { "category": "self", "summary": "SUSE Bug 1173822", "url": "https://bugzilla.suse.com/1173822" }, { "category": "self", "summary": "SUSE Bug 1173823", "url": "https://bugzilla.suse.com/1173823" }, { "category": "self", "summary": "SUSE Bug 1173824", "url": "https://bugzilla.suse.com/1173824" }, { "category": "self", "summary": "SUSE Bug 1173825", "url": "https://bugzilla.suse.com/1173825" }, { "category": "self", "summary": "SUSE Bug 1173826", "url": "https://bugzilla.suse.com/1173826" }, { "category": "self", "summary": "SUSE Bug 1173827", "url": "https://bugzilla.suse.com/1173827" }, { "category": "self", "summary": "SUSE Bug 1173828", "url": "https://bugzilla.suse.com/1173828" }, { "category": "self", "summary": "SUSE Bug 1173830", "url": "https://bugzilla.suse.com/1173830" }, { "category": "self", "summary": "SUSE Bug 1173831", "url": "https://bugzilla.suse.com/1173831" }, { "category": "self", "summary": "SUSE Bug 1173832", "url": "https://bugzilla.suse.com/1173832" }, { "category": "self", "summary": "SUSE Bug 1173833", "url": "https://bugzilla.suse.com/1173833" }, { "category": "self", "summary": "SUSE Bug 1173834", "url": "https://bugzilla.suse.com/1173834" }, { "category": "self", "summary": "SUSE Bug 1173836", "url": "https://bugzilla.suse.com/1173836" }, { "category": "self", "summary": "SUSE Bug 1173837", "url": "https://bugzilla.suse.com/1173837" }, { "category": "self", "summary": "SUSE Bug 1173838", "url": "https://bugzilla.suse.com/1173838" }, { "category": "self", "summary": "SUSE Bug 1173839", "url": "https://bugzilla.suse.com/1173839" }, { "category": "self", "summary": "SUSE Bug 1173841", "url": "https://bugzilla.suse.com/1173841" }, { "category": "self", "summary": "SUSE Bug 1173843", "url": "https://bugzilla.suse.com/1173843" }, { "category": "self", "summary": "SUSE Bug 1173844", "url": "https://bugzilla.suse.com/1173844" }, { "category": "self", "summary": "SUSE Bug 1173845", "url": "https://bugzilla.suse.com/1173845" }, { "category": "self", "summary": "SUSE Bug 1173847", "url": "https://bugzilla.suse.com/1173847" }, { "category": "self", "summary": "SUSE Bug 1173849", "url": "https://bugzilla.suse.com/1173849" }, { "category": "self", "summary": "SUSE Bug 1173860", "url": "https://bugzilla.suse.com/1173860" }, { "category": "self", "summary": "SUSE Bug 1173894", "url": "https://bugzilla.suse.com/1173894" }, { "category": "self", "summary": "SUSE Bug 1173941", "url": "https://bugzilla.suse.com/1173941" }, { "category": "self", "summary": "SUSE Bug 1173954", "url": "https://bugzilla.suse.com/1173954" }, { "category": "self", "summary": "SUSE Bug 1174002", "url": "https://bugzilla.suse.com/1174002" }, { "category": "self", "summary": "SUSE Bug 1174003", "url": "https://bugzilla.suse.com/1174003" }, { "category": "self", "summary": "SUSE Bug 1174018", "url": "https://bugzilla.suse.com/1174018" }, { "category": "self", "summary": "SUSE Bug 1174026", "url": "https://bugzilla.suse.com/1174026" }, { "category": "self", "summary": "SUSE Bug 1174029", "url": "https://bugzilla.suse.com/1174029" }, { "category": "self", "summary": "SUSE Bug 1174072", "url": "https://bugzilla.suse.com/1174072" }, { "category": "self", "summary": "SUSE Bug 1174098", "url": "https://bugzilla.suse.com/1174098" }, { "category": "self", "summary": "SUSE Bug 1174110", "url": "https://bugzilla.suse.com/1174110" }, { "category": "self", "summary": "SUSE Bug 1174111", "url": "https://bugzilla.suse.com/1174111" }, { "category": "self", "summary": "SUSE Bug 1174116", "url": "https://bugzilla.suse.com/1174116" }, { "category": "self", "summary": "SUSE Bug 1174126", "url": "https://bugzilla.suse.com/1174126" }, { "category": "self", "summary": "SUSE Bug 1174127", "url": "https://bugzilla.suse.com/1174127" }, { "category": "self", "summary": "SUSE Bug 1174128", "url": "https://bugzilla.suse.com/1174128" }, { "category": "self", "summary": "SUSE Bug 1174129", "url": "https://bugzilla.suse.com/1174129" }, { "category": "self", "summary": "SUSE Bug 1174146", "url": "https://bugzilla.suse.com/1174146" }, { "category": "self", "summary": "SUSE Bug 1174185", "url": "https://bugzilla.suse.com/1174185" }, { "category": "self", "summary": "SUSE Bug 1174205", "url": "https://bugzilla.suse.com/1174205" }, { "category": "self", "summary": "SUSE Bug 1174244", "url": "https://bugzilla.suse.com/1174244" }, { "category": "self", "summary": "SUSE Bug 1174263", "url": "https://bugzilla.suse.com/1174263" }, { "category": "self", "summary": "SUSE Bug 1174264", "url": "https://bugzilla.suse.com/1174264" }, { "category": "self", "summary": "SUSE Bug 1174331", "url": "https://bugzilla.suse.com/1174331" }, { "category": "self", "summary": "SUSE Bug 1174332", "url": "https://bugzilla.suse.com/1174332" }, { "category": "self", "summary": "SUSE Bug 1174333", "url": "https://bugzilla.suse.com/1174333" }, { "category": "self", "summary": "SUSE Bug 1174345", "url": "https://bugzilla.suse.com/1174345" }, { "category": "self", "summary": "SUSE Bug 1174356", "url": "https://bugzilla.suse.com/1174356" }, { "category": "self", "summary": "SUSE Bug 1174358", "url": "https://bugzilla.suse.com/1174358" }, { "category": "self", "summary": "SUSE Bug 1174362", "url": "https://bugzilla.suse.com/1174362" }, { "category": "self", "summary": "SUSE Bug 1174387", "url": "https://bugzilla.suse.com/1174387" }, { "category": "self", "summary": "SUSE Bug 1174396", "url": "https://bugzilla.suse.com/1174396" }, { "category": "self", "summary": "SUSE Bug 1174398", "url": "https://bugzilla.suse.com/1174398" }, { "category": "self", "summary": "SUSE Bug 1174407", "url": "https://bugzilla.suse.com/1174407" }, { "category": "self", "summary": "SUSE Bug 1174409", "url": "https://bugzilla.suse.com/1174409" }, { "category": "self", "summary": "SUSE Bug 1174411", "url": "https://bugzilla.suse.com/1174411" }, { "category": "self", "summary": "SUSE Bug 1174438", "url": "https://bugzilla.suse.com/1174438" }, { "category": "self", "summary": "SUSE Bug 1174462", "url": "https://bugzilla.suse.com/1174462" }, { "category": "self", "summary": "SUSE Bug 1174484", "url": "https://bugzilla.suse.com/1174484" }, { "category": "self", "summary": "SUSE Bug 1174486", "url": "https://bugzilla.suse.com/1174486" }, { "category": "self", "summary": "SUSE Bug 1174513", "url": "https://bugzilla.suse.com/1174513" }, { "category": "self", "summary": "SUSE Bug 1174527", "url": "https://bugzilla.suse.com/1174527" }, { "category": "self", "summary": "SUSE Bug 1174625", "url": "https://bugzilla.suse.com/1174625" }, { "category": "self", "summary": "SUSE Bug 1174627", "url": "https://bugzilla.suse.com/1174627" }, { "category": "self", "summary": "SUSE Bug 1174645", "url": "https://bugzilla.suse.com/1174645" }, { "category": "self", "summary": "SUSE Bug 1174689", "url": "https://bugzilla.suse.com/1174689" }, { "category": "self", "summary": "SUSE Bug 1174699", "url": "https://bugzilla.suse.com/1174699" }, { "category": "self", "summary": "SUSE Bug 1174737", "url": "https://bugzilla.suse.com/1174737" }, { "category": "self", "summary": "SUSE Bug 1174748", "url": "https://bugzilla.suse.com/1174748" }, { "category": "self", "summary": "SUSE Bug 1174757", "url": "https://bugzilla.suse.com/1174757" }, { "category": "self", "summary": "SUSE Bug 1174762", "url": "https://bugzilla.suse.com/1174762" }, { "category": "self", "summary": "SUSE Bug 1174770", "url": "https://bugzilla.suse.com/1174770" }, { "category": "self", "summary": "SUSE Bug 1174771", "url": "https://bugzilla.suse.com/1174771" }, { "category": "self", "summary": "SUSE Bug 1174777", "url": "https://bugzilla.suse.com/1174777" }, { "category": "self", "summary": "SUSE Bug 1174805", "url": "https://bugzilla.suse.com/1174805" }, { "category": "self", "summary": "SUSE Bug 1174824", "url": "https://bugzilla.suse.com/1174824" }, { "category": "self", "summary": "SUSE Bug 1174825", "url": "https://bugzilla.suse.com/1174825" }, { "category": "self", "summary": "SUSE Bug 1174852", "url": "https://bugzilla.suse.com/1174852" }, { "category": "self", "summary": "SUSE Bug 1174865", "url": "https://bugzilla.suse.com/1174865" }, { "category": "self", "summary": "SUSE Bug 1174880", "url": "https://bugzilla.suse.com/1174880" }, { "category": "self", "summary": "SUSE Bug 1174897", "url": "https://bugzilla.suse.com/1174897" }, { "category": "self", "summary": "SUSE Bug 1174899", "url": "https://bugzilla.suse.com/1174899" }, { "category": "self", "summary": "SUSE Bug 1174906", "url": "https://bugzilla.suse.com/1174906" }, { "category": "self", "summary": "SUSE Bug 1174969", "url": "https://bugzilla.suse.com/1174969" }, { "category": "self", "summary": "SUSE Bug 1175009", "url": "https://bugzilla.suse.com/1175009" }, { "category": "self", "summary": "SUSE Bug 1175010", "url": "https://bugzilla.suse.com/1175010" }, { "category": "self", "summary": "SUSE Bug 1175011", "url": "https://bugzilla.suse.com/1175011" }, { "category": "self", "summary": "SUSE Bug 1175012", "url": "https://bugzilla.suse.com/1175012" }, { "category": "self", "summary": "SUSE Bug 1175013", "url": "https://bugzilla.suse.com/1175013" }, { "category": "self", "summary": "SUSE Bug 1175014", "url": "https://bugzilla.suse.com/1175014" }, { "category": "self", "summary": "SUSE Bug 1175015", "url": "https://bugzilla.suse.com/1175015" }, { "category": "self", "summary": "SUSE Bug 1175016", "url": "https://bugzilla.suse.com/1175016" }, { "category": "self", "summary": "SUSE Bug 1175017", "url": "https://bugzilla.suse.com/1175017" }, { "category": "self", "summary": "SUSE Bug 1175018", "url": "https://bugzilla.suse.com/1175018" }, { "category": "self", "summary": "SUSE Bug 1175019", "url": "https://bugzilla.suse.com/1175019" }, { "category": "self", "summary": "SUSE Bug 1175020", "url": "https://bugzilla.suse.com/1175020" }, { "category": "self", "summary": "SUSE Bug 1175021", "url": "https://bugzilla.suse.com/1175021" }, { "category": "self", "summary": "SUSE Bug 1175052", "url": "https://bugzilla.suse.com/1175052" }, { "category": "self", "summary": "SUSE Bug 1175079", "url": "https://bugzilla.suse.com/1175079" }, { "category": "self", "summary": "SUSE Bug 1175112", "url": "https://bugzilla.suse.com/1175112" }, { "category": "self", "summary": "SUSE Bug 1175116", "url": "https://bugzilla.suse.com/1175116" }, { "category": "self", "summary": "SUSE Bug 1175128", "url": "https://bugzilla.suse.com/1175128" }, { "category": "self", "summary": "SUSE Bug 1175149", "url": "https://bugzilla.suse.com/1175149" }, { "category": "self", "summary": "SUSE Bug 1175175", "url": "https://bugzilla.suse.com/1175175" }, { "category": "self", "summary": "SUSE Bug 1175176", "url": "https://bugzilla.suse.com/1175176" }, { "category": "self", "summary": "SUSE Bug 1175180", "url": "https://bugzilla.suse.com/1175180" }, { "category": "self", "summary": "SUSE Bug 1175181", "url": "https://bugzilla.suse.com/1175181" }, { "category": "self", "summary": "SUSE Bug 1175182", "url": "https://bugzilla.suse.com/1175182" }, { "category": "self", "summary": "SUSE Bug 1175183", "url": "https://bugzilla.suse.com/1175183" }, { "category": "self", "summary": "SUSE Bug 1175184", "url": "https://bugzilla.suse.com/1175184" }, { "category": "self", "summary": "SUSE Bug 1175185", "url": "https://bugzilla.suse.com/1175185" }, { "category": "self", "summary": "SUSE Bug 1175186", "url": "https://bugzilla.suse.com/1175186" }, { "category": "self", "summary": "SUSE Bug 1175187", "url": "https://bugzilla.suse.com/1175187" }, { "category": "self", "summary": "SUSE Bug 1175188", "url": "https://bugzilla.suse.com/1175188" }, { "category": "self", "summary": "SUSE Bug 1175189", "url": "https://bugzilla.suse.com/1175189" }, { "category": "self", "summary": "SUSE Bug 1175190", "url": "https://bugzilla.suse.com/1175190" }, { "category": "self", "summary": "SUSE Bug 1175191", "url": "https://bugzilla.suse.com/1175191" }, { "category": "self", "summary": "SUSE Bug 1175192", "url": "https://bugzilla.suse.com/1175192" }, { "category": "self", "summary": "SUSE Bug 1175195", "url": "https://bugzilla.suse.com/1175195" }, { "category": "self", "summary": "SUSE Bug 1175199", "url": "https://bugzilla.suse.com/1175199" }, { "category": "self", "summary": "SUSE Bug 1175213", "url": "https://bugzilla.suse.com/1175213" }, { "category": "self", "summary": "SUSE Bug 1175232", "url": "https://bugzilla.suse.com/1175232" }, { "category": "self", "summary": "SUSE Bug 1175263", "url": "https://bugzilla.suse.com/1175263" }, { "category": "self", "summary": "SUSE Bug 1175284", "url": "https://bugzilla.suse.com/1175284" }, { "category": "self", "summary": "SUSE Bug 1175296", "url": "https://bugzilla.suse.com/1175296" }, { "category": "self", "summary": "SUSE Bug 1175306", "url": "https://bugzilla.suse.com/1175306" }, { "category": "self", "summary": "SUSE Bug 1175344", "url": "https://bugzilla.suse.com/1175344" }, { "category": "self", "summary": "SUSE Bug 1175345", "url": "https://bugzilla.suse.com/1175345" }, { "category": "self", "summary": "SUSE Bug 1175346", "url": "https://bugzilla.suse.com/1175346" }, { "category": "self", "summary": "SUSE Bug 1175347", "url": "https://bugzilla.suse.com/1175347" }, { "category": "self", "summary": "SUSE Bug 1175367", "url": "https://bugzilla.suse.com/1175367" }, { "category": "self", "summary": "SUSE Bug 1175377", "url": "https://bugzilla.suse.com/1175377" }, { "category": "self", "summary": "SUSE Bug 1175440", "url": "https://bugzilla.suse.com/1175440" }, { "category": "self", "summary": "SUSE Bug 1175480", "url": "https://bugzilla.suse.com/1175480" }, { "category": "self", "summary": "SUSE Bug 1175493", "url": "https://bugzilla.suse.com/1175493" }, { "category": "self", "summary": "SUSE Bug 1175546", "url": "https://bugzilla.suse.com/1175546" }, { "category": "self", "summary": "SUSE Bug 1175550", "url": "https://bugzilla.suse.com/1175550" }, { "category": "self", "summary": "SUSE Bug 1175599", "url": "https://bugzilla.suse.com/1175599" }, { "category": "self", "summary": "SUSE Bug 1175621", "url": "https://bugzilla.suse.com/1175621" }, { "category": "self", "summary": "SUSE Bug 1175654", "url": "https://bugzilla.suse.com/1175654" }, { "category": "self", "summary": "SUSE Bug 1175667", "url": "https://bugzilla.suse.com/1175667" }, { "category": "self", "summary": "SUSE Bug 1175691", "url": "https://bugzilla.suse.com/1175691" }, { "category": "self", "summary": "SUSE Bug 1175718", "url": "https://bugzilla.suse.com/1175718" }, { "category": "self", "summary": "SUSE Bug 1175721", "url": "https://bugzilla.suse.com/1175721" }, { "category": "self", "summary": "SUSE Bug 1175749", "url": "https://bugzilla.suse.com/1175749" }, { "category": "self", "summary": "SUSE Bug 1175768", "url": "https://bugzilla.suse.com/1175768" }, { "category": "self", "summary": "SUSE Bug 1175769", "url": "https://bugzilla.suse.com/1175769" }, { "category": "self", "summary": "SUSE Bug 1175770", "url": "https://bugzilla.suse.com/1175770" }, { "category": "self", "summary": "SUSE Bug 1175771", "url": "https://bugzilla.suse.com/1175771" }, { "category": "self", "summary": "SUSE Bug 1175772", "url": "https://bugzilla.suse.com/1175772" }, { "category": "self", "summary": "SUSE Bug 1175774", "url": "https://bugzilla.suse.com/1175774" }, { "category": "self", "summary": "SUSE Bug 1175775", "url": "https://bugzilla.suse.com/1175775" }, { "category": "self", "summary": "SUSE Bug 1175787", "url": "https://bugzilla.suse.com/1175787" }, { "category": "self", "summary": "SUSE Bug 1175807", "url": "https://bugzilla.suse.com/1175807" }, { "category": "self", "summary": "SUSE Bug 1175834", "url": "https://bugzilla.suse.com/1175834" }, { "category": "self", "summary": "SUSE Bug 1175873", "url": "https://bugzilla.suse.com/1175873" }, { "category": "self", "summary": "SUSE Bug 1175882", "url": "https://bugzilla.suse.com/1175882" }, { "category": "self", "summary": "SUSE Bug 1175898", "url": "https://bugzilla.suse.com/1175898" }, { "category": "self", "summary": "SUSE Bug 1175918", "url": "https://bugzilla.suse.com/1175918" }, { "category": "self", "summary": "SUSE Bug 1175952", "url": "https://bugzilla.suse.com/1175952" }, { "category": "self", "summary": "SUSE Bug 1175995", "url": "https://bugzilla.suse.com/1175995" }, { "category": "self", "summary": "SUSE Bug 1175996", "url": "https://bugzilla.suse.com/1175996" }, { "category": "self", "summary": "SUSE Bug 1175997", "url": "https://bugzilla.suse.com/1175997" }, { "category": "self", "summary": "SUSE Bug 1175998", "url": "https://bugzilla.suse.com/1175998" }, { "category": "self", "summary": "SUSE Bug 1175999", "url": "https://bugzilla.suse.com/1175999" }, { "category": "self", "summary": "SUSE Bug 1176000", "url": "https://bugzilla.suse.com/1176000" }, { "category": "self", "summary": "SUSE Bug 1176001", "url": "https://bugzilla.suse.com/1176001" }, { "category": "self", "summary": "SUSE Bug 1176019", "url": "https://bugzilla.suse.com/1176019" }, { "category": "self", "summary": "SUSE Bug 1176022", "url": "https://bugzilla.suse.com/1176022" }, { "category": "self", "summary": "SUSE Bug 1176038", "url": "https://bugzilla.suse.com/1176038" }, { "category": "self", "summary": "SUSE Bug 1176063", "url": "https://bugzilla.suse.com/1176063" }, { "category": "self", "summary": "SUSE Bug 1176069", "url": "https://bugzilla.suse.com/1176069" }, { "category": "self", "summary": "SUSE Bug 1176109", "url": "https://bugzilla.suse.com/1176109" }, { "category": "self", "summary": "SUSE Bug 1176137", "url": "https://bugzilla.suse.com/1176137" }, { "category": "self", "summary": "SUSE Bug 1176180", "url": "https://bugzilla.suse.com/1176180" }, { "category": "self", "summary": "SUSE Bug 1176200", "url": "https://bugzilla.suse.com/1176200" }, { "category": "self", "summary": "SUSE Bug 1176235", "url": "https://bugzilla.suse.com/1176235" }, { "category": "self", "summary": "SUSE Bug 1176236", "url": "https://bugzilla.suse.com/1176236" }, { "category": "self", "summary": "SUSE Bug 1176237", "url": "https://bugzilla.suse.com/1176237" }, { "category": "self", "summary": "SUSE Bug 1176242", "url": "https://bugzilla.suse.com/1176242" }, { "category": "self", "summary": "SUSE Bug 1176354", "url": "https://bugzilla.suse.com/1176354" }, { "category": "self", "summary": "SUSE Bug 1176357", "url": "https://bugzilla.suse.com/1176357" }, { "category": "self", "summary": "SUSE Bug 1176358", "url": "https://bugzilla.suse.com/1176358" }, { "category": "self", "summary": "SUSE Bug 1176359", "url": "https://bugzilla.suse.com/1176359" }, { "category": "self", "summary": "SUSE Bug 1176360", "url": "https://bugzilla.suse.com/1176360" }, { "category": "self", "summary": "SUSE Bug 1176361", "url": "https://bugzilla.suse.com/1176361" }, { "category": "self", "summary": "SUSE Bug 1176362", "url": "https://bugzilla.suse.com/1176362" }, { "category": "self", "summary": "SUSE Bug 1176363", "url": "https://bugzilla.suse.com/1176363" }, { "category": "self", "summary": "SUSE Bug 1176364", "url": "https://bugzilla.suse.com/1176364" }, { "category": "self", "summary": "SUSE Bug 1176365", "url": "https://bugzilla.suse.com/1176365" }, { "category": "self", "summary": "SUSE Bug 1176366", "url": "https://bugzilla.suse.com/1176366" }, { "category": "self", "summary": "SUSE Bug 1176367", "url": "https://bugzilla.suse.com/1176367" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176396", "url": "https://bugzilla.suse.com/1176396" }, { "category": "self", "summary": "SUSE Bug 1176400", "url": "https://bugzilla.suse.com/1176400" }, { "category": "self", "summary": "SUSE Bug 1176423", "url": "https://bugzilla.suse.com/1176423" }, { "category": "self", "summary": "SUSE Bug 1176449", "url": "https://bugzilla.suse.com/1176449" }, { "category": "self", "summary": "SUSE Bug 1176481", "url": "https://bugzilla.suse.com/1176481" }, { "category": "self", "summary": "SUSE Bug 1176485", "url": "https://bugzilla.suse.com/1176485" }, { "category": "self", "summary": "SUSE Bug 1176486", "url": "https://bugzilla.suse.com/1176486" }, { "category": "self", "summary": "SUSE Bug 1176507", "url": "https://bugzilla.suse.com/1176507" }, { "category": "self", "summary": "SUSE Bug 1176536", "url": "https://bugzilla.suse.com/1176536" }, { "category": "self", "summary": "SUSE Bug 1176537", "url": "https://bugzilla.suse.com/1176537" }, { "category": "self", "summary": "SUSE Bug 1176538", "url": "https://bugzilla.suse.com/1176538" }, { "category": "self", "summary": "SUSE Bug 1176539", "url": "https://bugzilla.suse.com/1176539" }, { "category": "self", "summary": "SUSE Bug 1176540", "url": "https://bugzilla.suse.com/1176540" }, { "category": "self", "summary": "SUSE Bug 1176541", "url": "https://bugzilla.suse.com/1176541" }, { "category": "self", "summary": "SUSE Bug 1176542", "url": "https://bugzilla.suse.com/1176542" }, { "category": "self", "summary": "SUSE Bug 1176543", "url": "https://bugzilla.suse.com/1176543" }, { "category": "self", "summary": "SUSE Bug 1176544", "url": "https://bugzilla.suse.com/1176544" }, { "category": "self", "summary": "SUSE Bug 1176545", "url": "https://bugzilla.suse.com/1176545" }, { "category": "self", "summary": "SUSE Bug 1176546", "url": "https://bugzilla.suse.com/1176546" }, { "category": "self", "summary": "SUSE Bug 1176548", "url": "https://bugzilla.suse.com/1176548" }, { "category": "self", "summary": "SUSE Bug 1176558", "url": "https://bugzilla.suse.com/1176558" }, { "category": "self", "summary": "SUSE Bug 1176559", "url": "https://bugzilla.suse.com/1176559" }, { "category": "self", "summary": "SUSE Bug 1176564", "url": "https://bugzilla.suse.com/1176564" }, { "category": "self", "summary": "SUSE Bug 1176586", "url": "https://bugzilla.suse.com/1176586" }, { "category": "self", "summary": "SUSE Bug 1176587", "url": "https://bugzilla.suse.com/1176587" }, { "category": "self", "summary": "SUSE Bug 1176588", "url": "https://bugzilla.suse.com/1176588" }, { "category": "self", "summary": "SUSE Bug 1176659", "url": "https://bugzilla.suse.com/1176659" }, { "category": "self", "summary": "SUSE Bug 1176698", "url": "https://bugzilla.suse.com/1176698" }, { "category": "self", "summary": "SUSE Bug 1176699", "url": "https://bugzilla.suse.com/1176699" }, { "category": "self", "summary": "SUSE Bug 1176700", "url": "https://bugzilla.suse.com/1176700" }, { "category": "self", "summary": "SUSE Bug 1176713", "url": "https://bugzilla.suse.com/1176713" }, { "category": "self", "summary": "SUSE Bug 1176721", "url": "https://bugzilla.suse.com/1176721" }, { "category": "self", "summary": "SUSE Bug 1176722", "url": "https://bugzilla.suse.com/1176722" }, { "category": "self", "summary": "SUSE Bug 1176725", "url": "https://bugzilla.suse.com/1176725" }, { "category": "self", "summary": "SUSE Bug 1176732", "url": "https://bugzilla.suse.com/1176732" }, { "category": "self", "summary": "SUSE Bug 1176763", "url": "https://bugzilla.suse.com/1176763" }, { "category": "self", "summary": "SUSE Bug 1176775", "url": "https://bugzilla.suse.com/1176775" }, { "category": "self", "summary": "SUSE Bug 1176788", "url": "https://bugzilla.suse.com/1176788" }, { "category": "self", "summary": "SUSE Bug 1176789", "url": "https://bugzilla.suse.com/1176789" }, { "category": "self", "summary": "SUSE Bug 1176833", "url": "https://bugzilla.suse.com/1176833" }, { "category": "self", "summary": "SUSE Bug 1176855", "url": "https://bugzilla.suse.com/1176855" }, { "category": "self", "summary": "SUSE Bug 1176869", "url": "https://bugzilla.suse.com/1176869" }, { "category": "self", "summary": "SUSE Bug 1176877", "url": "https://bugzilla.suse.com/1176877" }, { "category": "self", "summary": "SUSE Bug 1176907", "url": "https://bugzilla.suse.com/1176907" }, { "category": "self", "summary": "SUSE Bug 1176925", "url": "https://bugzilla.suse.com/1176925" }, { "category": "self", "summary": "SUSE Bug 1176942", "url": "https://bugzilla.suse.com/1176942" }, { "category": "self", "summary": "SUSE Bug 1176956", "url": "https://bugzilla.suse.com/1176956" }, { "category": "self", "summary": "SUSE Bug 1176962", "url": "https://bugzilla.suse.com/1176962" }, { "category": "self", "summary": "SUSE Bug 1176979", "url": "https://bugzilla.suse.com/1176979" }, { "category": "self", "summary": "SUSE Bug 1176980", "url": "https://bugzilla.suse.com/1176980" }, { "category": "self", "summary": "SUSE Bug 1176983", "url": "https://bugzilla.suse.com/1176983" }, { "category": "self", "summary": "SUSE Bug 1176990", "url": "https://bugzilla.suse.com/1176990" }, { "category": "self", "summary": "SUSE Bug 1177021", "url": "https://bugzilla.suse.com/1177021" }, { "category": "self", "summary": "SUSE Bug 1177030", "url": "https://bugzilla.suse.com/1177030" }, { "category": "self", "summary": "SUSE Bug 1177066", "url": "https://bugzilla.suse.com/1177066" }, { "category": "self", "summary": "SUSE Bug 1177070", "url": "https://bugzilla.suse.com/1177070" }, { "category": "self", "summary": "SUSE Bug 1177086", "url": "https://bugzilla.suse.com/1177086" }, { "category": "self", "summary": "SUSE Bug 1177090", "url": "https://bugzilla.suse.com/1177090" }, { "category": "self", "summary": "SUSE Bug 1177109", "url": "https://bugzilla.suse.com/1177109" }, { "category": "self", "summary": "SUSE Bug 1177121", "url": "https://bugzilla.suse.com/1177121" }, { "category": "self", "summary": "SUSE Bug 1177193", "url": "https://bugzilla.suse.com/1177193" }, { "category": "self", "summary": "SUSE Bug 1177194", "url": "https://bugzilla.suse.com/1177194" }, { "category": "self", "summary": "SUSE Bug 1177206", "url": "https://bugzilla.suse.com/1177206" }, { "category": "self", "summary": "SUSE Bug 1177258", "url": "https://bugzilla.suse.com/1177258" }, { "category": "self", "summary": "SUSE Bug 1177271", "url": "https://bugzilla.suse.com/1177271" }, { "category": "self", "summary": "SUSE Bug 1177281", "url": "https://bugzilla.suse.com/1177281" }, { "category": "self", "summary": "SUSE Bug 1177283", "url": "https://bugzilla.suse.com/1177283" }, { "category": "self", "summary": "SUSE Bug 1177284", "url": "https://bugzilla.suse.com/1177284" }, { "category": "self", "summary": "SUSE Bug 1177285", "url": "https://bugzilla.suse.com/1177285" }, { "category": "self", "summary": "SUSE Bug 1177286", "url": "https://bugzilla.suse.com/1177286" }, { "category": "self", "summary": "SUSE Bug 1177297", "url": "https://bugzilla.suse.com/1177297" }, { "category": "self", "summary": "SUSE Bug 1177326", "url": "https://bugzilla.suse.com/1177326" }, { "category": "self", "summary": "SUSE Bug 1177353", "url": "https://bugzilla.suse.com/1177353" }, { "category": "self", "summary": "SUSE Bug 1177384", "url": "https://bugzilla.suse.com/1177384" }, { "category": "self", "summary": "SUSE Bug 1177397", "url": "https://bugzilla.suse.com/1177397" }, { "category": "self", "summary": "SUSE Bug 1177410", "url": "https://bugzilla.suse.com/1177410" }, { "category": "self", "summary": "SUSE Bug 1177411", "url": "https://bugzilla.suse.com/1177411" }, { "category": "self", "summary": "SUSE Bug 1177470", "url": "https://bugzilla.suse.com/1177470" }, { "category": "self", "summary": "SUSE Bug 1177500", "url": "https://bugzilla.suse.com/1177500" }, { "category": "self", "summary": "SUSE Bug 1177511", "url": "https://bugzilla.suse.com/1177511" }, { "category": "self", "summary": "SUSE Bug 1177617", "url": "https://bugzilla.suse.com/1177617" }, { "category": "self", "summary": "SUSE Bug 1177666", "url": "https://bugzilla.suse.com/1177666" }, { "category": "self", "summary": "SUSE Bug 1177679", "url": "https://bugzilla.suse.com/1177679" }, { "category": "self", "summary": "SUSE Bug 1177681", "url": "https://bugzilla.suse.com/1177681" }, { "category": "self", "summary": "SUSE Bug 1177683", "url": "https://bugzilla.suse.com/1177683" }, { "category": "self", "summary": "SUSE Bug 1177687", "url": "https://bugzilla.suse.com/1177687" }, { "category": "self", "summary": "SUSE Bug 1177694", "url": "https://bugzilla.suse.com/1177694" }, { "category": "self", "summary": "SUSE Bug 1177697", "url": "https://bugzilla.suse.com/1177697" }, { "category": "self", "summary": "SUSE Bug 1177698", "url": "https://bugzilla.suse.com/1177698" }, { "category": "self", "summary": "SUSE Bug 1177703", "url": "https://bugzilla.suse.com/1177703" }, { "category": "self", "summary": "SUSE Bug 1177719", "url": "https://bugzilla.suse.com/1177719" }, { "category": "self", "summary": "SUSE Bug 1177724", "url": "https://bugzilla.suse.com/1177724" }, { "category": "self", "summary": "SUSE Bug 1177725", "url": "https://bugzilla.suse.com/1177725" }, { "category": "self", "summary": "SUSE Bug 1177726", "url": "https://bugzilla.suse.com/1177726" }, { "category": "self", "summary": "SUSE Bug 1177733", "url": "https://bugzilla.suse.com/1177733" }, { "category": "self", "summary": "SUSE Bug 1177739", "url": "https://bugzilla.suse.com/1177739" }, { "category": "self", "summary": "SUSE Bug 1177749", "url": "https://bugzilla.suse.com/1177749" }, { "category": "self", "summary": "SUSE Bug 1177750", "url": "https://bugzilla.suse.com/1177750" }, { "category": "self", "summary": "SUSE Bug 1177754", "url": "https://bugzilla.suse.com/1177754" }, { "category": "self", "summary": "SUSE Bug 1177755", "url": "https://bugzilla.suse.com/1177755" }, { "category": "self", "summary": "SUSE Bug 1177765", "url": "https://bugzilla.suse.com/1177765" }, { "category": "self", "summary": "SUSE Bug 1177766", "url": "https://bugzilla.suse.com/1177766" }, { "category": "self", "summary": "SUSE Bug 1177799", "url": "https://bugzilla.suse.com/1177799" }, { "category": "self", "summary": "SUSE Bug 1177801", "url": "https://bugzilla.suse.com/1177801" }, { "category": "self", "summary": "SUSE Bug 1177814", "url": "https://bugzilla.suse.com/1177814" }, { "category": "self", "summary": "SUSE Bug 1177817", "url": "https://bugzilla.suse.com/1177817" }, { "category": "self", "summary": "SUSE Bug 1177820", "url": "https://bugzilla.suse.com/1177820" }, { "category": "self", "summary": "SUSE Bug 1177854", "url": "https://bugzilla.suse.com/1177854" }, { "category": "self", "summary": "SUSE Bug 1177855", "url": "https://bugzilla.suse.com/1177855" }, { "category": "self", "summary": "SUSE Bug 1177856", "url": "https://bugzilla.suse.com/1177856" }, { "category": "self", "summary": "SUSE Bug 1177861", "url": "https://bugzilla.suse.com/1177861" }, { "category": "self", "summary": "SUSE Bug 1178002", "url": "https://bugzilla.suse.com/1178002" }, { "category": "self", "summary": "SUSE Bug 1178049", "url": "https://bugzilla.suse.com/1178049" }, { "category": "self", "summary": "SUSE Bug 1178079", "url": "https://bugzilla.suse.com/1178079" }, { "category": "self", "summary": "SUSE Bug 1178123", "url": "https://bugzilla.suse.com/1178123" }, { "category": "self", "summary": "SUSE Bug 1178166", "url": "https://bugzilla.suse.com/1178166" }, { "category": "self", "summary": "SUSE Bug 1178173", "url": "https://bugzilla.suse.com/1178173" }, { "category": "self", "summary": "SUSE Bug 1178175", "url": "https://bugzilla.suse.com/1178175" }, { "category": "self", "summary": "SUSE Bug 1178176", "url": "https://bugzilla.suse.com/1178176" }, { "category": "self", "summary": "SUSE Bug 1178177", "url": "https://bugzilla.suse.com/1178177" }, { "category": "self", "summary": "SUSE Bug 1178182", "url": "https://bugzilla.suse.com/1178182" }, { "category": "self", "summary": "SUSE Bug 1178183", "url": "https://bugzilla.suse.com/1178183" }, { "category": "self", "summary": "SUSE Bug 1178184", "url": "https://bugzilla.suse.com/1178184" }, { "category": "self", "summary": "SUSE Bug 1178185", "url": "https://bugzilla.suse.com/1178185" }, { "category": "self", "summary": "SUSE Bug 1178186", "url": "https://bugzilla.suse.com/1178186" }, { "category": "self", "summary": "SUSE Bug 1178190", "url": "https://bugzilla.suse.com/1178190" }, { "category": "self", "summary": "SUSE Bug 1178191", "url": "https://bugzilla.suse.com/1178191" }, { "category": "self", "summary": "SUSE Bug 1178203", "url": "https://bugzilla.suse.com/1178203" }, { "category": "self", "summary": "SUSE Bug 1178227", "url": "https://bugzilla.suse.com/1178227" }, { "category": "self", "summary": "SUSE Bug 1178246", "url": "https://bugzilla.suse.com/1178246" }, { "category": "self", "summary": "SUSE Bug 1178255", "url": "https://bugzilla.suse.com/1178255" }, { "category": "self", "summary": "SUSE Bug 1178270", "url": "https://bugzilla.suse.com/1178270" }, { "category": "self", "summary": "SUSE Bug 1178286", "url": "https://bugzilla.suse.com/1178286" }, { "category": "self", "summary": "SUSE Bug 1178307", "url": "https://bugzilla.suse.com/1178307" }, { "category": "self", "summary": "SUSE Bug 1178330", "url": "https://bugzilla.suse.com/1178330" }, { "category": "self", "summary": "SUSE Bug 1178393", "url": "https://bugzilla.suse.com/1178393" }, { "category": "self", "summary": "SUSE Bug 1178395", "url": "https://bugzilla.suse.com/1178395" }, { "category": "self", "summary": "SUSE Bug 1178401", "url": "https://bugzilla.suse.com/1178401" }, { "category": "self", "summary": "SUSE Bug 1178426", "url": "https://bugzilla.suse.com/1178426" }, { "category": "self", "summary": "SUSE Bug 1178461", "url": "https://bugzilla.suse.com/1178461" }, { "category": "self", "summary": "SUSE Bug 1178579", "url": "https://bugzilla.suse.com/1178579" }, { "category": "self", "summary": "SUSE Bug 1178581", "url": "https://bugzilla.suse.com/1178581" }, { "category": "self", "summary": "SUSE Bug 1178584", "url": "https://bugzilla.suse.com/1178584" }, { "category": "self", "summary": "SUSE Bug 1178585", "url": "https://bugzilla.suse.com/1178585" }, { "category": "self", "summary": "SUSE Bug 1178589", "url": "https://bugzilla.suse.com/1178589" }, { "category": "self", "summary": "SUSE Bug 1178590", "url": "https://bugzilla.suse.com/1178590" }, { "category": "self", "summary": "SUSE Bug 1178612", "url": "https://bugzilla.suse.com/1178612" }, { "category": "self", "summary": "SUSE Bug 1178634", "url": "https://bugzilla.suse.com/1178634" }, { "category": "self", "summary": "SUSE Bug 1178635", "url": "https://bugzilla.suse.com/1178635" }, { "category": "self", "summary": "SUSE Bug 1178653", "url": "https://bugzilla.suse.com/1178653" }, { "category": "self", "summary": "SUSE Bug 1178659", "url": "https://bugzilla.suse.com/1178659" }, { "category": "self", "summary": "SUSE Bug 1178660", "url": "https://bugzilla.suse.com/1178660" }, { "category": "self", "summary": "SUSE Bug 1178661", "url": "https://bugzilla.suse.com/1178661" }, { "category": "self", "summary": "SUSE Bug 1178669", "url": "https://bugzilla.suse.com/1178669" }, { "category": "self", "summary": "SUSE Bug 1178686", "url": "https://bugzilla.suse.com/1178686" }, { "category": "self", "summary": "SUSE Bug 1178740", "url": "https://bugzilla.suse.com/1178740" }, { "category": "self", "summary": "SUSE Bug 1178755", "url": "https://bugzilla.suse.com/1178755" }, { "category": "self", "summary": "SUSE Bug 1178756", "url": "https://bugzilla.suse.com/1178756" }, { "category": "self", "summary": "SUSE Bug 1178762", "url": "https://bugzilla.suse.com/1178762" }, { "category": "self", "summary": "SUSE Bug 1178780", "url": "https://bugzilla.suse.com/1178780" }, { "category": "self", "summary": "SUSE Bug 1178838", "url": "https://bugzilla.suse.com/1178838" }, { "category": "self", "summary": "SUSE Bug 1178853", "url": "https://bugzilla.suse.com/1178853" }, { "category": "self", "summary": "SUSE Bug 1178886", "url": "https://bugzilla.suse.com/1178886" }, { "category": "self", "summary": "SUSE Bug 1179001", "url": "https://bugzilla.suse.com/1179001" }, { "category": "self", "summary": "SUSE Bug 1179012", "url": "https://bugzilla.suse.com/1179012" }, { "category": "self", "summary": "SUSE Bug 1179014", "url": "https://bugzilla.suse.com/1179014" }, { "category": "self", "summary": "SUSE Bug 1179015", "url": "https://bugzilla.suse.com/1179015" }, { "category": "self", "summary": "SUSE Bug 1179045", "url": "https://bugzilla.suse.com/1179045" }, { "category": "self", "summary": "SUSE Bug 1179076", "url": "https://bugzilla.suse.com/1179076" }, { "category": "self", "summary": "SUSE Bug 1179082", "url": "https://bugzilla.suse.com/1179082" }, { "category": "self", "summary": "SUSE Bug 1179107", "url": "https://bugzilla.suse.com/1179107" }, { "category": "self", "summary": "SUSE Bug 1179140", "url": "https://bugzilla.suse.com/1179140" }, { "category": "self", "summary": "SUSE Bug 1179141", "url": "https://bugzilla.suse.com/1179141" }, { "category": "self", "summary": "SUSE Bug 1179160", "url": "https://bugzilla.suse.com/1179160" }, { "category": "self", "summary": "SUSE Bug 1179201", "url": "https://bugzilla.suse.com/1179201" }, { "category": "self", "summary": "SUSE Bug 1179204", "url": "https://bugzilla.suse.com/1179204" }, { "category": "self", "summary": "SUSE Bug 1179211", "url": "https://bugzilla.suse.com/1179211" }, { "category": "self", "summary": "SUSE Bug 1179217", "url": "https://bugzilla.suse.com/1179217" }, { "category": "self", "summary": "SUSE Bug 1179419", "url": "https://bugzilla.suse.com/1179419" }, { "category": "self", "summary": "SUSE Bug 1179424", "url": "https://bugzilla.suse.com/1179424" }, { "category": "self", "summary": "SUSE Bug 1179425", "url": "https://bugzilla.suse.com/1179425" }, { "category": "self", "summary": "SUSE Bug 1179426", "url": "https://bugzilla.suse.com/1179426" }, { "category": "self", "summary": "SUSE Bug 1179427", "url": "https://bugzilla.suse.com/1179427" }, { "category": "self", "summary": "SUSE Bug 1179429", "url": "https://bugzilla.suse.com/1179429" }, { "category": "self", "summary": "SUSE Bug 1179432", "url": "https://bugzilla.suse.com/1179432" }, { "category": "self", "summary": "SUSE Bug 1179434", "url": "https://bugzilla.suse.com/1179434" }, { "category": "self", "summary": "SUSE Bug 1179435", "url": "https://bugzilla.suse.com/1179435" }, { "category": "self", "summary": "SUSE Bug 1179442", "url": "https://bugzilla.suse.com/1179442" }, { "category": "self", "summary": "SUSE Bug 1179519", "url": "https://bugzilla.suse.com/1179519" }, { "category": "self", "summary": "SUSE Bug 1179550", "url": "https://bugzilla.suse.com/1179550" }, { "category": "self", "summary": "SUSE Bug 1179575", "url": "https://bugzilla.suse.com/1179575" }, { "category": "self", "summary": "SUSE Bug 1179578", "url": "https://bugzilla.suse.com/1179578" }, { "category": "self", "summary": "SUSE Bug 1179601", "url": "https://bugzilla.suse.com/1179601" }, { "category": "self", "summary": "SUSE Bug 1179604", "url": "https://bugzilla.suse.com/1179604" }, { "category": "self", "summary": "SUSE Bug 1179639", "url": "https://bugzilla.suse.com/1179639" }, { "category": "self", "summary": "SUSE Bug 1179652", "url": "https://bugzilla.suse.com/1179652" }, { "category": "self", "summary": "SUSE Bug 1179656", "url": "https://bugzilla.suse.com/1179656" }, { "category": "self", "summary": "SUSE Bug 1179670", "url": "https://bugzilla.suse.com/1179670" }, { "category": "self", "summary": "SUSE Bug 1179671", "url": "https://bugzilla.suse.com/1179671" }, { "category": "self", "summary": "SUSE Bug 1179672", "url": "https://bugzilla.suse.com/1179672" }, { "category": "self", "summary": "SUSE Bug 1179673", "url": "https://bugzilla.suse.com/1179673" }, { "category": "self", "summary": "SUSE Bug 1179675", "url": "https://bugzilla.suse.com/1179675" }, { "category": "self", "summary": "SUSE Bug 1179676", "url": "https://bugzilla.suse.com/1179676" }, { "category": "self", "summary": "SUSE Bug 1179677", "url": "https://bugzilla.suse.com/1179677" }, { "category": "self", "summary": "SUSE Bug 1179678", "url": "https://bugzilla.suse.com/1179678" }, { "category": "self", "summary": "SUSE Bug 1179679", "url": "https://bugzilla.suse.com/1179679" }, { "category": "self", "summary": "SUSE Bug 1179680", "url": "https://bugzilla.suse.com/1179680" }, { "category": "self", "summary": "SUSE Bug 1179681", "url": "https://bugzilla.suse.com/1179681" }, { "category": "self", "summary": "SUSE Bug 1179682", "url": "https://bugzilla.suse.com/1179682" }, { "category": "self", "summary": "SUSE Bug 1179683", "url": "https://bugzilla.suse.com/1179683" }, { "category": "self", "summary": "SUSE Bug 1179684", "url": "https://bugzilla.suse.com/1179684" }, { "category": "self", "summary": "SUSE Bug 1179685", "url": "https://bugzilla.suse.com/1179685" }, { "category": "self", "summary": "SUSE Bug 1179687", "url": "https://bugzilla.suse.com/1179687" }, { "category": "self", "summary": "SUSE Bug 1179688", "url": "https://bugzilla.suse.com/1179688" }, { "category": "self", "summary": "SUSE Bug 1179689", "url": "https://bugzilla.suse.com/1179689" }, { "category": "self", "summary": "SUSE Bug 1179690", "url": "https://bugzilla.suse.com/1179690" }, { "category": "self", "summary": "SUSE Bug 1179703", "url": "https://bugzilla.suse.com/1179703" }, { "category": "self", "summary": "SUSE Bug 1179704", "url": "https://bugzilla.suse.com/1179704" }, { "category": "self", "summary": "SUSE Bug 1179707", "url": "https://bugzilla.suse.com/1179707" }, { "category": "self", "summary": "SUSE Bug 1179709", "url": "https://bugzilla.suse.com/1179709" }, { "category": "self", "summary": "SUSE Bug 1179710", "url": "https://bugzilla.suse.com/1179710" }, { "category": "self", "summary": "SUSE Bug 1179711", "url": "https://bugzilla.suse.com/1179711" }, { "category": "self", "summary": "SUSE Bug 1179712", "url": "https://bugzilla.suse.com/1179712" }, { "category": "self", "summary": "SUSE Bug 1179713", "url": "https://bugzilla.suse.com/1179713" }, { "category": "self", "summary": "SUSE Bug 1179714", "url": "https://bugzilla.suse.com/1179714" }, { "category": "self", "summary": "SUSE Bug 1179715", "url": "https://bugzilla.suse.com/1179715" }, { "category": "self", "summary": "SUSE Bug 1179716", "url": "https://bugzilla.suse.com/1179716" }, { "category": "self", "summary": "SUSE Bug 1179745", "url": "https://bugzilla.suse.com/1179745" }, { "category": "self", "summary": "SUSE Bug 1179763", "url": "https://bugzilla.suse.com/1179763" }, { "category": "self", "summary": "SUSE Bug 1179887", "url": "https://bugzilla.suse.com/1179887" }, { "category": "self", "summary": "SUSE Bug 1179888", "url": "https://bugzilla.suse.com/1179888" }, { "category": "self", "summary": "SUSE Bug 1179892", "url": "https://bugzilla.suse.com/1179892" }, { "category": "self", "summary": "SUSE Bug 1179896", "url": "https://bugzilla.suse.com/1179896" }, { "category": "self", "summary": "SUSE Bug 1179960", "url": "https://bugzilla.suse.com/1179960" }, { "category": "self", "summary": "SUSE Bug 1179963", "url": "https://bugzilla.suse.com/1179963" }, { "category": "self", "summary": "SUSE Bug 1180027", "url": "https://bugzilla.suse.com/1180027" }, { "category": "self", "summary": "SUSE Bug 1180029", "url": "https://bugzilla.suse.com/1180029" }, { "category": "self", "summary": "SUSE Bug 1180031", "url": "https://bugzilla.suse.com/1180031" }, { "category": "self", "summary": "SUSE Bug 1180052", "url": "https://bugzilla.suse.com/1180052" }, { "category": "self", "summary": "SUSE Bug 1180056", "url": "https://bugzilla.suse.com/1180056" }, { "category": "self", "summary": "SUSE Bug 1180086", "url": "https://bugzilla.suse.com/1180086" }, { "category": "self", "summary": "SUSE Bug 1180117", "url": "https://bugzilla.suse.com/1180117" }, { "category": "self", "summary": "SUSE Bug 1180258", "url": "https://bugzilla.suse.com/1180258" }, { "category": "self", "summary": "SUSE Bug 1180261", "url": "https://bugzilla.suse.com/1180261" }, { "category": "self", "summary": "SUSE Bug 1180349", "url": "https://bugzilla.suse.com/1180349" }, { "category": "self", "summary": "SUSE Bug 1180506", "url": "https://bugzilla.suse.com/1180506" }, { "category": "self", "summary": "SUSE Bug 1180541", "url": "https://bugzilla.suse.com/1180541" }, { "category": "self", "summary": "SUSE Bug 1180559", "url": "https://bugzilla.suse.com/1180559" }, { "category": "self", "summary": "SUSE Bug 1180566", "url": "https://bugzilla.suse.com/1180566" }, { "category": "self", "summary": "SUSE Bug 173030", "url": "https://bugzilla.suse.com/173030" }, { "category": "self", "summary": "SUSE Bug 744692", "url": "https://bugzilla.suse.com/744692" }, { "category": "self", "summary": "SUSE Bug 789311", "url": "https://bugzilla.suse.com/789311" }, { "category": "self", "summary": "SUSE Bug 954532", "url": "https://bugzilla.suse.com/954532" }, { "category": "self", "summary": "SUSE Bug 995541", "url": "https://bugzilla.suse.com/995541" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19462 page", "url": "https://www.suse.com/security/cve/CVE-2019-19462/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20810 page", "url": "https://www.suse.com/security/cve/CVE-2019-20810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20812 page", "url": "https://www.suse.com/security/cve/CVE-2019-20812/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0110 page", "url": "https://www.suse.com/security/cve/CVE-2020-0110/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0305 page", "url": "https://www.suse.com/security/cve/CVE-2020-0305/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0404 page", "url": "https://www.suse.com/security/cve/CVE-2020-0404/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0427 page", "url": "https://www.suse.com/security/cve/CVE-2020-0427/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0431 page", "url": "https://www.suse.com/security/cve/CVE-2020-0431/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0432 page", "url": "https://www.suse.com/security/cve/CVE-2020-0432/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0444 page", "url": "https://www.suse.com/security/cve/CVE-2020-0444/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0465 page", "url": "https://www.suse.com/security/cve/CVE-2020-0465/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0466 page", "url": "https://www.suse.com/security/cve/CVE-2020-0466/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10711 page", "url": "https://www.suse.com/security/cve/CVE-2020-10711/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10732 page", "url": "https://www.suse.com/security/cve/CVE-2020-10732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10751 page", "url": "https://www.suse.com/security/cve/CVE-2020-10751/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10757 page", "url": "https://www.suse.com/security/cve/CVE-2020-10757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10773 page", "url": "https://www.suse.com/security/cve/CVE-2020-10773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10781 page", "url": "https://www.suse.com/security/cve/CVE-2020-10781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11668 page", "url": "https://www.suse.com/security/cve/CVE-2020-11668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12652 page", "url": "https://www.suse.com/security/cve/CVE-2020-12652/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12656 page", "url": "https://www.suse.com/security/cve/CVE-2020-12656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12769 page", "url": "https://www.suse.com/security/cve/CVE-2020-12769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12771 page", "url": "https://www.suse.com/security/cve/CVE-2020-12771/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12888 page", "url": "https://www.suse.com/security/cve/CVE-2020-12888/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13143 page", "url": "https://www.suse.com/security/cve/CVE-2020-13143/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13974 page", "url": "https://www.suse.com/security/cve/CVE-2020-13974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14314 page", "url": "https://www.suse.com/security/cve/CVE-2020-14314/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14351 page", "url": "https://www.suse.com/security/cve/CVE-2020-14351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14356 page", "url": "https://www.suse.com/security/cve/CVE-2020-14356/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14385 page", "url": "https://www.suse.com/security/cve/CVE-2020-14385/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14386 page", "url": "https://www.suse.com/security/cve/CVE-2020-14386/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14390 page", "url": "https://www.suse.com/security/cve/CVE-2020-14390/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14416 page", "url": "https://www.suse.com/security/cve/CVE-2020-14416/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15393 page", "url": "https://www.suse.com/security/cve/CVE-2020-15393/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15436 page", "url": "https://www.suse.com/security/cve/CVE-2020-15436/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15437 page", "url": "https://www.suse.com/security/cve/CVE-2020-15437/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16120 page", "url": "https://www.suse.com/security/cve/CVE-2020-16120/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16166 page", "url": "https://www.suse.com/security/cve/CVE-2020-16166/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1749 page", "url": "https://www.suse.com/security/cve/CVE-2020-1749/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24490 page", "url": "https://www.suse.com/security/cve/CVE-2020-24490/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25284 page", "url": "https://www.suse.com/security/cve/CVE-2020-25284/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25285 page", "url": "https://www.suse.com/security/cve/CVE-2020-25285/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25641 page", "url": "https://www.suse.com/security/cve/CVE-2020-25641/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25643 page", "url": "https://www.suse.com/security/cve/CVE-2020-25643/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25669 page", "url": "https://www.suse.com/security/cve/CVE-2020-25669/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25704 page", "url": "https://www.suse.com/security/cve/CVE-2020-25704/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25705 page", "url": "https://www.suse.com/security/cve/CVE-2020-25705/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26088 page", "url": "https://www.suse.com/security/cve/CVE-2020-26088/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27068 page", "url": "https://www.suse.com/security/cve/CVE-2020-27068/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27777 page", "url": "https://www.suse.com/security/cve/CVE-2020-27777/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27786 page", "url": "https://www.suse.com/security/cve/CVE-2020-27786/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27825 page", "url": "https://www.suse.com/security/cve/CVE-2020-27825/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27830 page", "url": "https://www.suse.com/security/cve/CVE-2020-27830/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28915 page", "url": "https://www.suse.com/security/cve/CVE-2020-28915/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28941 page", "url": "https://www.suse.com/security/cve/CVE-2020-28941/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28974 page", "url": "https://www.suse.com/security/cve/CVE-2020-28974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29369 page", "url": "https://www.suse.com/security/cve/CVE-2020-29369/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29370 page", "url": "https://www.suse.com/security/cve/CVE-2020-29370/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29371 page", "url": "https://www.suse.com/security/cve/CVE-2020-29371/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29373 page", "url": "https://www.suse.com/security/cve/CVE-2020-29373/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29660 page", "url": "https://www.suse.com/security/cve/CVE-2020-29660/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29661 page", "url": "https://www.suse.com/security/cve/CVE-2020-29661/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-36158 page", "url": "https://www.suse.com/security/cve/CVE-2020-36158/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-4788 page", "url": "https://www.suse.com/security/cve/CVE-2020-4788/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8694 page", "url": "https://www.suse.com/security/cve/CVE-2020-8694/" } ], "title": "Security update for RT kernel", "tracking": { "current_release_date": "2021-02-05T15:16:03Z", "generator": { "date": "2021-02-05T15:16:03Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2021:0242-1", "initial_release_date": "2021-02-05T15:16:03Z", "revision_history": [ { "date": "2021-02-05T15:16:03Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "product": { "name": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "product_id": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "product": { "name": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "product_id": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.2", "product": { "name": "openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch" }, "product_reference": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch" }, "product_reference": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19462" } ], "notes": [ { "category": "general", "text": "relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19462", "url": "https://www.suse.com/security/cve/CVE-2019-19462" }, { "category": "external", "summary": "SUSE Bug 1158265 for CVE-2019-19462", "url": "https://bugzilla.suse.com/1158265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "low" } ], "title": "CVE-2019-19462" }, { "cve": "CVE-2019-20810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20810" } ], "notes": [ { "category": "general", "text": "go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20810", "url": "https://www.suse.com/security/cve/CVE-2019-20810" }, { "category": "external", "summary": "SUSE Bug 1172458 for CVE-2019-20810", "url": "https://bugzilla.suse.com/1172458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "low" } ], "title": "CVE-2019-20810" }, { "cve": "CVE-2019-20812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20812" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20812", "url": "https://www.suse.com/security/cve/CVE-2019-20812" }, { "category": "external", "summary": "SUSE Bug 1172453 for CVE-2019-20812", "url": "https://bugzilla.suse.com/1172453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2019-20812" }, { "cve": "CVE-2020-0110", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0110" } ], "notes": [ { "category": "general", "text": "In psi_write of psi.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-148159562References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0110", "url": "https://www.suse.com/security/cve/CVE-2020-0110" }, { "category": "external", "summary": "SUSE Bug 1171374 for CVE-2020-0110", "url": "https://bugzilla.suse.com/1171374" }, { "category": "external", "summary": "SUSE Bug 1174874 for CVE-2020-0110", "url": "https://bugzilla.suse.com/1174874" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-0110" }, { "cve": "CVE-2020-0305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0305" } ], "notes": [ { "category": "general", "text": "In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0305", "url": "https://www.suse.com/security/cve/CVE-2020-0305" }, { "category": "external", "summary": "SUSE Bug 1174462 for CVE-2020-0305", "url": "https://bugzilla.suse.com/1174462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-0305" }, { "cve": "CVE-2020-0404", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0404" } ], "notes": [ { "category": "general", "text": "In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0404", "url": "https://www.suse.com/security/cve/CVE-2020-0404" }, { "category": "external", "summary": "SUSE Bug 1176423 for CVE-2020-0404", "url": "https://bugzilla.suse.com/1176423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-0404" }, { "cve": "CVE-2020-0427", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0427" } ], "notes": [ { "category": "general", "text": "In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0427", "url": "https://www.suse.com/security/cve/CVE-2020-0427" }, { "category": "external", "summary": "SUSE Bug 1176725 for CVE-2020-0427", "url": "https://bugzilla.suse.com/1176725" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-0427" }, { "cve": "CVE-2020-0431", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0431" } ], "notes": [ { "category": "general", "text": "In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0431", "url": "https://www.suse.com/security/cve/CVE-2020-0431" }, { "category": "external", "summary": "SUSE Bug 1176722 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176722" }, { "category": "external", "summary": "SUSE Bug 1176896 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-0431" }, { "cve": "CVE-2020-0432", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0432" } ], "notes": [ { "category": "general", "text": "In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0432", "url": "https://www.suse.com/security/cve/CVE-2020-0432" }, { "category": "external", "summary": "SUSE Bug 1176721 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1176721" }, { "category": "external", "summary": "SUSE Bug 1177165 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1177165" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-0432" }, { "cve": "CVE-2020-0444", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0444" } ], "notes": [ { "category": "general", "text": "In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0444", "url": "https://www.suse.com/security/cve/CVE-2020-0444" }, { "category": "external", "summary": "SUSE Bug 1180027 for CVE-2020-0444", "url": "https://bugzilla.suse.com/1180027" }, { "category": "external", "summary": "SUSE Bug 1180028 for CVE-2020-0444", "url": "https://bugzilla.suse.com/1180028" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-0444" }, { "cve": "CVE-2020-0465", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0465" } ], "notes": [ { "category": "general", "text": "In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0465", "url": "https://www.suse.com/security/cve/CVE-2020-0465" }, { "category": "external", "summary": "SUSE Bug 1180029 for CVE-2020-0465", "url": "https://bugzilla.suse.com/1180029" }, { "category": "external", "summary": "SUSE Bug 1180030 for CVE-2020-0465", "url": "https://bugzilla.suse.com/1180030" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-0465" }, { "cve": "CVE-2020-0466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0466" } ], "notes": [ { "category": "general", "text": "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0466", "url": "https://www.suse.com/security/cve/CVE-2020-0466" }, { "category": "external", "summary": "SUSE Bug 1180031 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1180031" }, { "category": "external", "summary": "SUSE Bug 1180032 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1180032" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-0466" }, { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-10711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10711" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10711", "url": "https://www.suse.com/security/cve/CVE-2020-10711" }, { "category": "external", "summary": "SUSE Bug 1171191 for CVE-2020-10711", "url": "https://bugzilla.suse.com/1171191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10711" }, { "cve": "CVE-2020-10732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10732" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10732", "url": "https://www.suse.com/security/cve/CVE-2020-10732" }, { "category": "external", "summary": "SUSE Bug 1171220 for CVE-2020-10732", "url": "https://bugzilla.suse.com/1171220" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "low" } ], "title": "CVE-2020-10732" }, { "cve": "CVE-2020-10751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10751" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10751", "url": "https://www.suse.com/security/cve/CVE-2020-10751" }, { "category": "external", "summary": "SUSE Bug 1171189 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1171189" }, { "category": "external", "summary": "SUSE Bug 1174963 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1174963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10751" }, { "cve": "CVE-2020-10757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10757" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10757", "url": "https://www.suse.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172317 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172317" }, { "category": "external", "summary": "SUSE Bug 1172437 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172437" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-10757" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-10773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10773" } ], "notes": [ { "category": "general", "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u0027s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10773", "url": "https://www.suse.com/security/cve/CVE-2020-10773" }, { "category": "external", "summary": "SUSE Bug 1172999 for CVE-2020-10773", "url": "https://bugzilla.suse.com/1172999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "low" } ], "title": "CVE-2020-10773" }, { "cve": "CVE-2020-10781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10781" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10781", "url": "https://www.suse.com/security/cve/CVE-2020-10781" }, { "category": "external", "summary": "SUSE Bug 1173074 for CVE-2020-10781", "url": "https://bugzilla.suse.com/1173074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10781" }, { "cve": "CVE-2020-11668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11668" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11668", "url": "https://www.suse.com/security/cve/CVE-2020-11668" }, { "category": "external", "summary": "SUSE Bug 1168952 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1168952" }, { "category": "external", "summary": "SUSE Bug 1173942 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1173942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-11668" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-12652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12652" } ], "notes": [ { "category": "general", "text": "The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12652", "url": "https://www.suse.com/security/cve/CVE-2020-12652" }, { "category": "external", "summary": "SUSE Bug 1171218 for CVE-2020-12652", "url": "https://bugzilla.suse.com/1171218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-12652" }, { "cve": "CVE-2020-12656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12656" } ], "notes": [ { "category": "general", "text": "gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12656", "url": "https://www.suse.com/security/cve/CVE-2020-12656" }, { "category": "external", "summary": "SUSE Bug 1171219 for CVE-2020-12656", "url": "https://bugzilla.suse.com/1171219" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "low" } ], "title": "CVE-2020-12656" }, { "cve": "CVE-2020-12769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12769" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12769", "url": "https://www.suse.com/security/cve/CVE-2020-12769" }, { "category": "external", "summary": "SUSE Bug 1171983 for CVE-2020-12769", "url": "https://bugzilla.suse.com/1171983" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-12769" }, { "cve": "CVE-2020-12771", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12771" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12771", "url": "https://www.suse.com/security/cve/CVE-2020-12771" }, { "category": "external", "summary": "SUSE Bug 1171732 for CVE-2020-12771", "url": "https://bugzilla.suse.com/1171732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-12771" }, { "cve": "CVE-2020-12888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12888" } ], "notes": [ { "category": "general", "text": "The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12888", "url": "https://www.suse.com/security/cve/CVE-2020-12888" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171868 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1171868" }, { "category": "external", "summary": "SUSE Bug 1176979 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1176979" }, { "category": "external", "summary": "SUSE Bug 1179612 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1179612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-12888" }, { "cve": "CVE-2020-13143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13143" } ], "notes": [ { "category": "general", "text": "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13143", "url": "https://www.suse.com/security/cve/CVE-2020-13143" }, { "category": "external", "summary": "SUSE Bug 1171982 for CVE-2020-13143", "url": "https://bugzilla.suse.com/1171982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-13143" }, { "cve": "CVE-2020-13974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13974" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13974", "url": "https://www.suse.com/security/cve/CVE-2020-13974" }, { "category": "external", "summary": "SUSE Bug 1172775 for CVE-2020-13974", "url": "https://bugzilla.suse.com/1172775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-13974" }, { "cve": "CVE-2020-14314", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14314" } ], "notes": [ { "category": "general", "text": "A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14314", "url": "https://www.suse.com/security/cve/CVE-2020-14314" }, { "category": "external", "summary": "SUSE Bug 1173798 for CVE-2020-14314", "url": "https://bugzilla.suse.com/1173798" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-14314" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14351" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14351", "url": "https://www.suse.com/security/cve/CVE-2020-14351" }, { "category": "external", "summary": "SUSE Bug 1177086 for CVE-2020-14351", "url": "https://bugzilla.suse.com/1177086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-14351" }, { "cve": "CVE-2020-14356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14356" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14356", "url": "https://www.suse.com/security/cve/CVE-2020-14356" }, { "category": "external", "summary": "SUSE Bug 1175213 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1175213" }, { "category": "external", "summary": "SUSE Bug 1176392 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1176392" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-14356" }, { "cve": "CVE-2020-14385", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14385" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. A failure of the file system metadata validator in XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14385", "url": "https://www.suse.com/security/cve/CVE-2020-14385" }, { "category": "external", "summary": "SUSE Bug 1176137 for CVE-2020-14385", "url": "https://bugzilla.suse.com/1176137" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-14385" }, { "cve": "CVE-2020-14386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14386" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14386", "url": "https://www.suse.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "SUSE Bug 1176069 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176069" }, { "category": "external", "summary": "SUSE Bug 1176072 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-14386" }, { "cve": "CVE-2020-14390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14390" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14390", "url": "https://www.suse.com/security/cve/CVE-2020-14390" }, { "category": "external", "summary": "SUSE Bug 1176235 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176235" }, { "category": "external", "summary": "SUSE Bug 1176253 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176253" }, { "category": "external", "summary": "SUSE Bug 1176278 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-14390" }, { "cve": "CVE-2020-14416", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14416" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14416", "url": "https://www.suse.com/security/cve/CVE-2020-14416" }, { "category": "external", "summary": "SUSE Bug 1162002 for CVE-2020-14416", "url": "https://bugzilla.suse.com/1162002" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-14416" }, { "cve": "CVE-2020-15393", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15393" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15393", "url": "https://www.suse.com/security/cve/CVE-2020-15393" }, { "category": "external", "summary": "SUSE Bug 1173514 for CVE-2020-15393", "url": "https://bugzilla.suse.com/1173514" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-15393" }, { "cve": "CVE-2020-15436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15436" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15436", "url": "https://www.suse.com/security/cve/CVE-2020-15436" }, { "category": "external", "summary": "SUSE Bug 1179141 for CVE-2020-15436", "url": "https://bugzilla.suse.com/1179141" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-15436" }, { "cve": "CVE-2020-15437", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15437" } ], "notes": [ { "category": "general", "text": "The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p-\u003eserial_in pointer which uninitialized.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15437", "url": "https://www.suse.com/security/cve/CVE-2020-15437" }, { "category": "external", "summary": "SUSE Bug 1179140 for CVE-2020-15437", "url": "https://bugzilla.suse.com/1179140" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-15437" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-15780" }, { "cve": "CVE-2020-16120", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16120" } ], "notes": [ { "category": "general", "text": "Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef (\"ovl: stack file ops\"). This was fixed in kernel version 5.8 by commits 56230d9 (\"ovl: verify permissions in ovl_path_open()\"), 48bd024 (\"ovl: switch to mounter creds in readdir\") and 05acefb (\"ovl: check permission to open real file\"). Additionally, commits 130fdbc (\"ovl: pass correct flags for opening real directory\") and 292f902 (\"ovl: call secutiry hook in ovl_real_ioctl()\") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da (\"ovl: do not fail because of O_NOATIMEi\") in kernel 5.11.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16120", "url": "https://www.suse.com/security/cve/CVE-2020-16120" }, { "category": "external", "summary": "SUSE Bug 1177470 for CVE-2020-16120", "url": "https://bugzilla.suse.com/1177470" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-16120" }, { "cve": "CVE-2020-16166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16166" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16166", "url": "https://www.suse.com/security/cve/CVE-2020-16166" }, { "category": "external", "summary": "SUSE Bug 1174757 for CVE-2020-16166", "url": "https://bugzilla.suse.com/1174757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-16166" }, { "cve": "CVE-2020-1749", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1749" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1749", "url": "https://www.suse.com/security/cve/CVE-2020-1749" }, { "category": "external", "summary": "SUSE Bug 1165629 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165629" }, { "category": "external", "summary": "SUSE Bug 1165631 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165631" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177513" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1189302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-1749" }, { "cve": "CVE-2020-24490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24490" } ], "notes": [ { "category": "general", "text": "Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24490", "url": "https://www.suse.com/security/cve/CVE-2020-24490" }, { "category": "external", "summary": "SUSE Bug 1177726 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177726" }, { "category": "external", "summary": "SUSE Bug 1177727 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177727" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-24490" }, { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25284" } ], "notes": [ { "category": "general", "text": "The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25284", "url": "https://www.suse.com/security/cve/CVE-2020-25284" }, { "category": "external", "summary": "SUSE Bug 1176482 for CVE-2020-25284", "url": "https://bugzilla.suse.com/1176482" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25284" }, { "cve": "CVE-2020-25285", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25285" } ], "notes": [ { "category": "general", "text": "A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25285", "url": "https://www.suse.com/security/cve/CVE-2020-25285" }, { "category": "external", "summary": "SUSE Bug 1176485 for CVE-2020-25285", "url": "https://bugzilla.suse.com/1176485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25285" }, { "cve": "CVE-2020-25641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25641" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25641", "url": "https://www.suse.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "SUSE Bug 1177121 for CVE-2020-25641", "url": "https://bugzilla.suse.com/1177121" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25641" }, { "cve": "CVE-2020-25643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25643" } ], "notes": [ { "category": "general", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25643", "url": "https://www.suse.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "SUSE Bug 1177206 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177206" }, { "category": "external", "summary": "SUSE Bug 1177226 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-25643" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-25645" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-25669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25669" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25669", "url": "https://www.suse.com/security/cve/CVE-2020-25669" }, { "category": "external", "summary": "SUSE Bug 1178182 for CVE-2020-25669", "url": "https://bugzilla.suse.com/1178182" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25669" }, { "cve": "CVE-2020-25704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25704" } ], "notes": [ { "category": "general", "text": "A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25704", "url": "https://www.suse.com/security/cve/CVE-2020-25704" }, { "category": "external", "summary": "SUSE Bug 1178393 for CVE-2020-25704", "url": "https://bugzilla.suse.com/1178393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25704" }, { "cve": "CVE-2020-25705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25705" } ], "notes": [ { "category": "general", "text": "A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25705", "url": "https://www.suse.com/security/cve/CVE-2020-25705" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 1178782 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178782" }, { "category": "external", "summary": "SUSE Bug 1178783 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178783" }, { "category": "external", "summary": "SUSE Bug 1191790 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1191790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-25705" }, { "cve": "CVE-2020-26088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26088" } ], "notes": [ { "category": "general", "text": "A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26088", "url": "https://www.suse.com/security/cve/CVE-2020-26088" }, { "category": "external", "summary": "SUSE Bug 1176990 for CVE-2020-26088", "url": "https://bugzilla.suse.com/1176990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-26088" }, { "cve": "CVE-2020-27068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27068" } ], "notes": [ { "category": "general", "text": "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27068", "url": "https://www.suse.com/security/cve/CVE-2020-27068" }, { "category": "external", "summary": "SUSE Bug 1180086 for CVE-2020-27068", "url": "https://bugzilla.suse.com/1180086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-27068" }, { "cve": "CVE-2020-27777", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27777" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27777", "url": "https://www.suse.com/security/cve/CVE-2020-27777" }, { "category": "external", "summary": "SUSE Bug 1179107 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1179107" }, { "category": "external", "summary": "SUSE Bug 1179419 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1179419" }, { "category": "external", "summary": "SUSE Bug 1200343 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1200343" }, { "category": "external", "summary": "SUSE Bug 1220060 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1220060" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-27777" }, { "cve": "CVE-2020-27786", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27786" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27786", "url": "https://www.suse.com/security/cve/CVE-2020-27786" }, { "category": "external", "summary": "SUSE Bug 1179601 for CVE-2020-27786", "url": "https://bugzilla.suse.com/1179601" }, { "category": "external", "summary": "SUSE Bug 1179616 for CVE-2020-27786", "url": "https://bugzilla.suse.com/1179616" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-27786" }, { "cve": "CVE-2020-27825", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27825" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27825", "url": "https://www.suse.com/security/cve/CVE-2020-27825" }, { "category": "external", "summary": "SUSE Bug 1179960 for CVE-2020-27825", "url": "https://bugzilla.suse.com/1179960" }, { "category": "external", "summary": "SUSE Bug 1179961 for CVE-2020-27825", "url": "https://bugzilla.suse.com/1179961" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-27825" }, { "cve": "CVE-2020-27830", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27830" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27830", "url": "https://www.suse.com/security/cve/CVE-2020-27830" }, { "category": "external", "summary": "SUSE Bug 1179656 for CVE-2020-27830", "url": "https://bugzilla.suse.com/1179656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-27830" }, { "cve": "CVE-2020-28915", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28915" } ], "notes": [ { "category": "general", "text": "A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28915", "url": "https://www.suse.com/security/cve/CVE-2020-28915" }, { "category": "external", "summary": "SUSE Bug 1178886 for CVE-2020-28915", "url": "https://bugzilla.suse.com/1178886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-28915" }, { "cve": "CVE-2020-28941", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28941" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/accessibility/speakup/spk_ttyio.c in the Linux kernel through 5.9.9. Local attackers on systems with the speakup driver could cause a local denial of service attack, aka CID-d41227544427. This occurs because of an invalid free when the line discipline is used more than once.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28941", "url": "https://www.suse.com/security/cve/CVE-2020-28941" }, { "category": "external", "summary": "SUSE Bug 1178740 for CVE-2020-28941", "url": "https://bugzilla.suse.com/1178740" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-28941" }, { "cve": "CVE-2020-28974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28974" } ], "notes": [ { "category": "general", "text": "A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28974", "url": "https://www.suse.com/security/cve/CVE-2020-28974" }, { "category": "external", "summary": "SUSE Bug 1178589 for CVE-2020-28974", "url": "https://bugzilla.suse.com/1178589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-28974" }, { "cve": "CVE-2020-29369", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29369" } ], "notes": [ { "category": "general", "text": "An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29369", "url": "https://www.suse.com/security/cve/CVE-2020-29369" }, { "category": "external", "summary": "SUSE Bug 1173504 for CVE-2020-29369", "url": "https://bugzilla.suse.com/1173504" }, { "category": "external", "summary": "SUSE Bug 1179432 for CVE-2020-29369", "url": "https://bugzilla.suse.com/1179432" }, { "category": "external", "summary": "SUSE Bug 1179646 for CVE-2020-29369", "url": "https://bugzilla.suse.com/1179646" }, { "category": "external", "summary": "SUSE Bug 1182109 for CVE-2020-29369", "url": "https://bugzilla.suse.com/1182109" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-29369" }, { "cve": "CVE-2020-29370", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29370" } ], "notes": [ { "category": "general", "text": "An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29370", "url": "https://www.suse.com/security/cve/CVE-2020-29370" }, { "category": "external", "summary": "SUSE Bug 1179435 for CVE-2020-29370", "url": "https://bugzilla.suse.com/1179435" }, { "category": "external", "summary": "SUSE Bug 1179648 for CVE-2020-29370", "url": "https://bugzilla.suse.com/1179648" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-29370" }, { "cve": "CVE-2020-29371", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29371" } ], "notes": [ { "category": "general", "text": "An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29371", "url": "https://www.suse.com/security/cve/CVE-2020-29371" }, { "category": "external", "summary": "SUSE Bug 1179429 for CVE-2020-29371", "url": "https://bugzilla.suse.com/1179429" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-29371" }, { "cve": "CVE-2020-29373", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29373" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/io_uring.c in the Linux kernel before 5.6. It unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations, aka CID-ff002b30181d.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29373", "url": "https://www.suse.com/security/cve/CVE-2020-29373" }, { "category": "external", "summary": "SUSE Bug 1179434 for CVE-2020-29373", "url": "https://bugzilla.suse.com/1179434" }, { "category": "external", "summary": "SUSE Bug 1179779 for CVE-2020-29373", "url": "https://bugzilla.suse.com/1179779" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-29373" }, { "cve": "CVE-2020-29660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29660" } ], "notes": [ { "category": "general", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29660", "url": "https://www.suse.com/security/cve/CVE-2020-29660" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-29660" }, { "cve": "CVE-2020-29661", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29661" } ], "notes": [ { "category": "general", "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29661", "url": "https://www.suse.com/security/cve/CVE-2020-29661" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179877" }, { "category": "external", "summary": "SUSE Bug 1214268 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1214268" }, { "category": "external", "summary": "SUSE Bug 1218966 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1218966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-29661" }, { "cve": "CVE-2020-36158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-36158" } ], "notes": [ { "category": "general", "text": "mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-36158", "url": "https://www.suse.com/security/cve/CVE-2020-36158" }, { "category": "external", "summary": "SUSE Bug 1180559 for CVE-2020-36158", "url": "https://bugzilla.suse.com/1180559" }, { "category": "external", "summary": "SUSE Bug 1180562 for CVE-2020-36158", "url": "https://bugzilla.suse.com/1180562" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-36158" }, { "cve": "CVE-2020-4788", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-4788" } ], "notes": [ { "category": "general", "text": "IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-4788", "url": "https://www.suse.com/security/cve/CVE-2020-4788" }, { "category": "external", "summary": "SUSE Bug 1177666 for CVE-2020-4788", "url": "https://bugzilla.suse.com/1177666" }, { "category": "external", "summary": "SUSE Bug 1181158 for CVE-2020-4788", "url": "https://bugzilla.suse.com/1181158" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-4788" }, { "cve": "CVE-2020-8694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8694" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8694", "url": "https://www.suse.com/security/cve/CVE-2020-8694" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178700 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178700" }, { "category": "external", "summary": "SUSE Bug 1179661 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1179661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-8694" } ] }
opensuse-su-2024:10728-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
kernel-devel-5.14.6-1.4 on GA media
Notes
Title of the patch
kernel-devel-5.14.6-1.4 on GA media
Description of the patch
These are all security issues fixed in the kernel-devel-5.14.6-1.4 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10728
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "kernel-devel-5.14.6-1.4 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the kernel-devel-5.14.6-1.4 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10728", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10728-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000251 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000251/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12153 page", "url": "https://www.suse.com/security/cve/CVE-2017-12153/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13080 page", "url": "https://www.suse.com/security/cve/CVE-2017-13080/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14051 page", "url": "https://www.suse.com/security/cve/CVE-2017-14051/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15129 page", "url": "https://www.suse.com/security/cve/CVE-2017-15129/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15265 page", "url": "https://www.suse.com/security/cve/CVE-2017-15265/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16536 page", "url": "https://www.suse.com/security/cve/CVE-2017-16536/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16537 page", "url": "https://www.suse.com/security/cve/CVE-2017-16537/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16645 page", "url": "https://www.suse.com/security/cve/CVE-2017-16645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16646 page", "url": "https://www.suse.com/security/cve/CVE-2017-16646/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16647 page", "url": "https://www.suse.com/security/cve/CVE-2017-16647/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16648 page", "url": "https://www.suse.com/security/cve/CVE-2017-16648/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16995 page", "url": "https://www.suse.com/security/cve/CVE-2017-16995/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16996 page", "url": "https://www.suse.com/security/cve/CVE-2017-16996/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17448 page", "url": "https://www.suse.com/security/cve/CVE-2017-17448/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17449 page", "url": "https://www.suse.com/security/cve/CVE-2017-17449/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17450 page", "url": "https://www.suse.com/security/cve/CVE-2017-17450/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17852 page", "url": "https://www.suse.com/security/cve/CVE-2017-17852/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17853 page", "url": "https://www.suse.com/security/cve/CVE-2017-17853/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17854 page", "url": "https://www.suse.com/security/cve/CVE-2017-17854/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17855 page", "url": "https://www.suse.com/security/cve/CVE-2017-17855/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17856 page", "url": "https://www.suse.com/security/cve/CVE-2017-17856/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17857 page", "url": "https://www.suse.com/security/cve/CVE-2017-17857/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17862 page", "url": "https://www.suse.com/security/cve/CVE-2017-17862/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5123 page", "url": "https://www.suse.com/security/cve/CVE-2017-5123/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5715 page", "url": "https://www.suse.com/security/cve/CVE-2017-5715/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5754 page", "url": "https://www.suse.com/security/cve/CVE-2017-5754/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7541 page", "url": "https://www.suse.com/security/cve/CVE-2017-7541/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7542 page", "url": "https://www.suse.com/security/cve/CVE-2017-7542/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8824 page", "url": "https://www.suse.com/security/cve/CVE-2017-8824/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8831 page", "url": "https://www.suse.com/security/cve/CVE-2017-8831/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10322 page", "url": "https://www.suse.com/security/cve/CVE-2018-10322/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10323 page", "url": "https://www.suse.com/security/cve/CVE-2018-10323/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1118 page", "url": "https://www.suse.com/security/cve/CVE-2018-1118/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12232 page", "url": "https://www.suse.com/security/cve/CVE-2018-12232/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12714 page", "url": "https://www.suse.com/security/cve/CVE-2018-12714/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13053 page", "url": "https://www.suse.com/security/cve/CVE-2018-13053/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18710 page", "url": "https://www.suse.com/security/cve/CVE-2018-18710/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19824 page", "url": "https://www.suse.com/security/cve/CVE-2018-19824/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5332 page", "url": "https://www.suse.com/security/cve/CVE-2018-5332/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5333 page", "url": "https://www.suse.com/security/cve/CVE-2018-5333/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8043 page", "url": "https://www.suse.com/security/cve/CVE-2018-8043/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8087 page", "url": "https://www.suse.com/security/cve/CVE-2018-8087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8822 page", "url": "https://www.suse.com/security/cve/CVE-2018-8822/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10207 page", "url": "https://www.suse.com/security/cve/CVE-2019-10207/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11477 page", "url": "https://www.suse.com/security/cve/CVE-2019-11477/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11478 page", "url": "https://www.suse.com/security/cve/CVE-2019-11478/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11479 page", "url": "https://www.suse.com/security/cve/CVE-2019-11479/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14615 page", "url": "https://www.suse.com/security/cve/CVE-2019-14615/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14814 page", "url": "https://www.suse.com/security/cve/CVE-2019-14814/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14896 page", "url": "https://www.suse.com/security/cve/CVE-2019-14896/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15030 page", "url": "https://www.suse.com/security/cve/CVE-2019-15030/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15031 page", "url": "https://www.suse.com/security/cve/CVE-2019-15031/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15098 page", "url": "https://www.suse.com/security/cve/CVE-2019-15098/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15099 page", "url": "https://www.suse.com/security/cve/CVE-2019-15099/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15290 page", "url": "https://www.suse.com/security/cve/CVE-2019-15290/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15504 page", "url": "https://www.suse.com/security/cve/CVE-2019-15504/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15902 page", "url": "https://www.suse.com/security/cve/CVE-2019-15902/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16231 page", "url": "https://www.suse.com/security/cve/CVE-2019-16231/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16232 page", "url": "https://www.suse.com/security/cve/CVE-2019-16232/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16234 page", "url": "https://www.suse.com/security/cve/CVE-2019-16234/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17133 page", "url": "https://www.suse.com/security/cve/CVE-2019-17133/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17666 page", "url": "https://www.suse.com/security/cve/CVE-2019-17666/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18808 page", "url": "https://www.suse.com/security/cve/CVE-2019-18808/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18812 page", "url": "https://www.suse.com/security/cve/CVE-2019-18812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18813 page", "url": "https://www.suse.com/security/cve/CVE-2019-18813/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19252 page", "url": "https://www.suse.com/security/cve/CVE-2019-19252/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19332 page", "url": "https://www.suse.com/security/cve/CVE-2019-19332/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19338 page", "url": "https://www.suse.com/security/cve/CVE-2019-19338/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3016 page", "url": "https://www.suse.com/security/cve/CVE-2019-3016/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3846 page", "url": "https://www.suse.com/security/cve/CVE-2019-3846/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3882 page", "url": "https://www.suse.com/security/cve/CVE-2019-3882/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3887 page", "url": "https://www.suse.com/security/cve/CVE-2019-3887/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8564 page", "url": "https://www.suse.com/security/cve/CVE-2019-8564/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8912 page", "url": "https://www.suse.com/security/cve/CVE-2019-8912/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9500 page", "url": "https://www.suse.com/security/cve/CVE-2019-9500/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14386 page", "url": "https://www.suse.com/security/cve/CVE-2020-14386/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24586 page", "url": "https://www.suse.com/security/cve/CVE-2020-24586/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24587 page", "url": "https://www.suse.com/security/cve/CVE-2020-24587/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24588 page", "url": "https://www.suse.com/security/cve/CVE-2020-24588/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25639 page", "url": "https://www.suse.com/security/cve/CVE-2020-25639/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26141 page", "url": "https://www.suse.com/security/cve/CVE-2020-26141/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2732 page", "url": "https://www.suse.com/security/cve/CVE-2020-2732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29660 page", "url": "https://www.suse.com/security/cve/CVE-2020-29660/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29661 page", "url": "https://www.suse.com/security/cve/CVE-2020-29661/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8648 page", "url": "https://www.suse.com/security/cve/CVE-2020-8648/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8694 page", "url": "https://www.suse.com/security/cve/CVE-2020-8694/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26708 page", "url": "https://www.suse.com/security/cve/CVE-2021-26708/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-28971 page", "url": "https://www.suse.com/security/cve/CVE-2021-28971/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32606 page", "url": "https://www.suse.com/security/cve/CVE-2021-32606/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33909 page", "url": "https://www.suse.com/security/cve/CVE-2021-33909/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3483 page", "url": "https://www.suse.com/security/cve/CVE-2021-3483/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3489 page", "url": "https://www.suse.com/security/cve/CVE-2021-3489/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3490 page", "url": "https://www.suse.com/security/cve/CVE-2021-3490/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3491 page", "url": "https://www.suse.com/security/cve/CVE-2021-3491/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3640 page", "url": "https://www.suse.com/security/cve/CVE-2021-3640/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3653 page", "url": "https://www.suse.com/security/cve/CVE-2021-3653/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3656 page", "url": "https://www.suse.com/security/cve/CVE-2021-3656/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3744 page", "url": "https://www.suse.com/security/cve/CVE-2021-3744/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3753 page", "url": "https://www.suse.com/security/cve/CVE-2021-3753/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37576 page", "url": "https://www.suse.com/security/cve/CVE-2021-37576/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3759 page", "url": "https://www.suse.com/security/cve/CVE-2021-3759/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38166 page", "url": "https://www.suse.com/security/cve/CVE-2021-38166/" } ], "title": "kernel-devel-5.14.6-1.4 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10728-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-5.14.6-1.4.aarch64", "product": { "name": "kernel-devel-5.14.6-1.4.aarch64", "product_id": "kernel-devel-5.14.6-1.4.aarch64" } }, { "category": "product_version", "name": "kernel-macros-5.14.6-1.4.aarch64", "product": { "name": "kernel-macros-5.14.6-1.4.aarch64", "product_id": "kernel-macros-5.14.6-1.4.aarch64" } }, { "category": "product_version", "name": "kernel-source-5.14.6-1.4.aarch64", "product": { "name": "kernel-source-5.14.6-1.4.aarch64", "product_id": "kernel-source-5.14.6-1.4.aarch64" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.14.6-1.4.aarch64", "product": { "name": "kernel-source-vanilla-5.14.6-1.4.aarch64", "product_id": "kernel-source-vanilla-5.14.6-1.4.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.14.6-1.4.ppc64le", "product": { "name": "kernel-devel-5.14.6-1.4.ppc64le", "product_id": "kernel-devel-5.14.6-1.4.ppc64le" } }, { "category": "product_version", "name": "kernel-macros-5.14.6-1.4.ppc64le", "product": { "name": "kernel-macros-5.14.6-1.4.ppc64le", "product_id": "kernel-macros-5.14.6-1.4.ppc64le" } }, { "category": "product_version", "name": "kernel-source-5.14.6-1.4.ppc64le", "product": { "name": "kernel-source-5.14.6-1.4.ppc64le", "product_id": "kernel-source-5.14.6-1.4.ppc64le" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.14.6-1.4.ppc64le", "product": { "name": "kernel-source-vanilla-5.14.6-1.4.ppc64le", "product_id": "kernel-source-vanilla-5.14.6-1.4.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.14.6-1.4.s390x", "product": { "name": "kernel-devel-5.14.6-1.4.s390x", "product_id": "kernel-devel-5.14.6-1.4.s390x" } }, { "category": "product_version", "name": "kernel-macros-5.14.6-1.4.s390x", "product": { "name": "kernel-macros-5.14.6-1.4.s390x", "product_id": "kernel-macros-5.14.6-1.4.s390x" } }, { "category": "product_version", "name": "kernel-source-5.14.6-1.4.s390x", "product": { "name": "kernel-source-5.14.6-1.4.s390x", "product_id": "kernel-source-5.14.6-1.4.s390x" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.14.6-1.4.s390x", "product": { "name": "kernel-source-vanilla-5.14.6-1.4.s390x", "product_id": "kernel-source-vanilla-5.14.6-1.4.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.14.6-1.4.x86_64", "product": { "name": "kernel-devel-5.14.6-1.4.x86_64", "product_id": "kernel-devel-5.14.6-1.4.x86_64" } }, { "category": "product_version", "name": "kernel-macros-5.14.6-1.4.x86_64", "product": { "name": "kernel-macros-5.14.6-1.4.x86_64", "product_id": "kernel-macros-5.14.6-1.4.x86_64" } }, { "category": "product_version", "name": "kernel-source-5.14.6-1.4.x86_64", "product": { "name": "kernel-source-5.14.6-1.4.x86_64", "product_id": "kernel-source-5.14.6-1.4.x86_64" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.14.6-1.4.x86_64", "product": { "name": "kernel-source-vanilla-5.14.6-1.4.x86_64", "product_id": "kernel-source-vanilla-5.14.6-1.4.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64" }, "product_reference": "kernel-devel-5.14.6-1.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le" }, "product_reference": "kernel-devel-5.14.6-1.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.6-1.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x" }, "product_reference": "kernel-devel-5.14.6-1.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64" }, "product_reference": "kernel-devel-5.14.6-1.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64" }, "product_reference": "kernel-macros-5.14.6-1.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le" }, "product_reference": "kernel-macros-5.14.6-1.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.6-1.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x" }, "product_reference": "kernel-macros-5.14.6-1.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64" }, "product_reference": "kernel-macros-5.14.6-1.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64" }, "product_reference": "kernel-source-5.14.6-1.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le" }, "product_reference": "kernel-source-5.14.6-1.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.6-1.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x" }, "product_reference": "kernel-source-5.14.6-1.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64" }, "product_reference": "kernel-source-5.14.6-1.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64" }, "product_reference": "kernel-source-vanilla-5.14.6-1.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le" }, "product_reference": "kernel-source-vanilla-5.14.6-1.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.14.6-1.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x" }, "product_reference": "kernel-source-vanilla-5.14.6-1.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" }, "product_reference": "kernel-source-vanilla-5.14.6-1.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-1000251", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000251" } ], "notes": [ { "category": "general", "text": "The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000251", "url": "https://www.suse.com/security/cve/CVE-2017-1000251" }, { "category": "external", "summary": "SUSE Bug 1057389 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1057389" }, { "category": "external", "summary": "SUSE Bug 1057950 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1057950" }, { "category": "external", "summary": "SUSE Bug 1070535 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1070535" }, { "category": "external", "summary": "SUSE Bug 1072117 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1072117" }, { "category": "external", "summary": "SUSE Bug 1072162 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1072162" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-1000251" }, { "cve": "CVE-2017-12153", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12153" } ], "notes": [ { "category": "general", "text": "A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12153", "url": "https://www.suse.com/security/cve/CVE-2017-12153" }, { "category": "external", "summary": "SUSE Bug 1058410 for CVE-2017-12153", "url": "https://bugzilla.suse.com/1058410" }, { "category": "external", "summary": "SUSE Bug 1058624 for CVE-2017-12153", "url": "https://bugzilla.suse.com/1058624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-12153" }, { "cve": "CVE-2017-13080", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13080" } ], "notes": [ { "category": "general", "text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13080", "url": "https://www.suse.com/security/cve/CVE-2017-13080" }, { "category": "external", "summary": "SUSE Bug 1056061 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1056061" }, { "category": "external", "summary": "SUSE Bug 1063479 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063479" }, { "category": "external", "summary": "SUSE Bug 1063667 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063667" }, { "category": "external", "summary": "SUSE Bug 1063671 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063671" }, { "category": "external", "summary": "SUSE Bug 1066295 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1066295" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1178872 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1178872" }, { "category": "external", "summary": "SUSE Bug 1179588 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1179588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-13080" }, { "cve": "CVE-2017-14051", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14051" } ], "notes": [ { "category": "general", "text": "An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14051", "url": "https://www.suse.com/security/cve/CVE-2017-14051" }, { "category": "external", "summary": "SUSE Bug 1056588 for CVE-2017-14051", "url": "https://bugzilla.suse.com/1056588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-14051" }, { "cve": "CVE-2017-15129", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15129" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15129", "url": "https://www.suse.com/security/cve/CVE-2017-15129" }, { "category": "external", "summary": "SUSE Bug 1074839 for CVE-2017-15129", "url": "https://bugzilla.suse.com/1074839" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-15129" }, { "cve": "CVE-2017-15265", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15265" } ], "notes": [ { "category": "general", "text": "Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15265", "url": "https://www.suse.com/security/cve/CVE-2017-15265" }, { "category": "external", "summary": "SUSE Bug 1062520 for CVE-2017-15265", "url": "https://bugzilla.suse.com/1062520" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-15265", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2017-15265" }, { "cve": "CVE-2017-16536", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16536" } ], "notes": [ { "category": "general", "text": "The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16536", "url": "https://www.suse.com/security/cve/CVE-2017-16536" }, { "category": "external", "summary": "SUSE Bug 1066606 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1066606" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16536" }, { "cve": "CVE-2017-16537", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16537" } ], "notes": [ { "category": "general", "text": "The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16537", "url": "https://www.suse.com/security/cve/CVE-2017-16537" }, { "category": "external", "summary": "SUSE Bug 1066573 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1066573" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16537" }, { "cve": "CVE-2017-16645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16645" } ], "notes": [ { "category": "general", "text": "The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16645", "url": "https://www.suse.com/security/cve/CVE-2017-16645" }, { "category": "external", "summary": "SUSE Bug 1067132 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1067132" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16645" }, { "cve": "CVE-2017-16646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16646" } ], "notes": [ { "category": "general", "text": "drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16646", "url": "https://www.suse.com/security/cve/CVE-2017-16646" }, { "category": "external", "summary": "SUSE Bug 1067105 for CVE-2017-16646", "url": "https://bugzilla.suse.com/1067105" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16646", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16646" }, { "cve": "CVE-2017-16647", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16647" } ], "notes": [ { "category": "general", "text": "drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16647", "url": "https://www.suse.com/security/cve/CVE-2017-16647" }, { "category": "external", "summary": "SUSE Bug 1067102 for CVE-2017-16647", "url": "https://bugzilla.suse.com/1067102" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16647", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16647" }, { "cve": "CVE-2017-16648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16648" } ], "notes": [ { "category": "general", "text": "The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16648", "url": "https://www.suse.com/security/cve/CVE-2017-16648" }, { "category": "external", "summary": "SUSE Bug 1067087 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1067087" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16648" }, { "cve": "CVE-2017-16995", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16995" } ], "notes": [ { "category": "general", "text": "The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16995", "url": "https://www.suse.com/security/cve/CVE-2017-16995" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-16995", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16995" }, { "cve": "CVE-2017-16996", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16996" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16996", "url": "https://www.suse.com/security/cve/CVE-2017-16996" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-16996", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16996" }, { "cve": "CVE-2017-17448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17448" } ], "notes": [ { "category": "general", "text": "net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17448", "url": "https://www.suse.com/security/cve/CVE-2017-17448" }, { "category": "external", "summary": "SUSE Bug 1071693 for CVE-2017-17448", "url": "https://bugzilla.suse.com/1071693" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17448" }, { "cve": "CVE-2017-17449", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17449" } ], "notes": [ { "category": "general", "text": "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17449", "url": "https://www.suse.com/security/cve/CVE-2017-17449" }, { "category": "external", "summary": "SUSE Bug 1071694 for CVE-2017-17449", "url": "https://bugzilla.suse.com/1071694" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17449" }, { "cve": "CVE-2017-17450", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17450" } ], "notes": [ { "category": "general", "text": "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17450", "url": "https://www.suse.com/security/cve/CVE-2017-17450" }, { "category": "external", "summary": "SUSE Bug 1071695 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1071695" }, { "category": "external", "summary": "SUSE Bug 1074033 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1074033" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17450" }, { "cve": "CVE-2017-17852", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17852" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17852", "url": "https://www.suse.com/security/cve/CVE-2017-17852" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17852", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17852" }, { "cve": "CVE-2017-17853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17853" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17853", "url": "https://www.suse.com/security/cve/CVE-2017-17853" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17853", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17853" }, { "cve": "CVE-2017-17854", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17854" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17854", "url": "https://www.suse.com/security/cve/CVE-2017-17854" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17854", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17854" }, { "cve": "CVE-2017-17855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17855" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17855", "url": "https://www.suse.com/security/cve/CVE-2017-17855" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17855", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17855" }, { "cve": "CVE-2017-17856", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17856" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17856", "url": "https://www.suse.com/security/cve/CVE-2017-17856" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17856", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17856" }, { "cve": "CVE-2017-17857", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17857" } ], "notes": [ { "category": "general", "text": "The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17857", "url": "https://www.suse.com/security/cve/CVE-2017-17857" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17857", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17857" }, { "cve": "CVE-2017-17862", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17862" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17862", "url": "https://www.suse.com/security/cve/CVE-2017-17862" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17862", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17862" }, { "cve": "CVE-2017-5123", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5123" } ], "notes": [ { "category": "general", "text": "Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5123", "url": "https://www.suse.com/security/cve/CVE-2017-5123" }, { "category": "external", "summary": "SUSE Bug 1062473 for CVE-2017-5123", "url": "https://bugzilla.suse.com/1062473" }, { "category": "external", "summary": "SUSE Bug 1122971 for CVE-2017-5123", "url": "https://bugzilla.suse.com/1122971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5123" }, { "cve": "CVE-2017-5715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5715" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5715", "url": "https://www.suse.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1074741 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074741" }, { "category": "external", "summary": "SUSE Bug 1074919 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074919" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075007 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075007" }, { "category": "external", "summary": "SUSE Bug 1075262 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075262" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1076115 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076115" }, { "category": "external", "summary": "SUSE Bug 1076372 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076372" }, { "category": "external", "summary": "SUSE Bug 1076606 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076606" }, { "category": "external", "summary": "SUSE Bug 1078353 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1078353" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087887 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087887" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1088147 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1088147" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1095735 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1095735" }, { "category": "external", "summary": "SUSE Bug 1102517 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1102517" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1126516 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1126516" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201457 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201457" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1203236 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1203236" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5715" }, { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2017-5754", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5754" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5754", "url": "https://www.suse.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075008 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1075008" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1115045 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1115045" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-5754" }, { "cve": "CVE-2017-7541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7541" } ], "notes": [ { "category": "general", "text": "The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7541", "url": "https://www.suse.com/security/cve/CVE-2017-7541" }, { "category": "external", "summary": "SUSE Bug 1049645 for CVE-2017-7541", "url": "https://bugzilla.suse.com/1049645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-7541" }, { "cve": "CVE-2017-7542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7542" } ], "notes": [ { "category": "general", "text": "The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7542", "url": "https://www.suse.com/security/cve/CVE-2017-7542" }, { "category": "external", "summary": "SUSE Bug 1049882 for CVE-2017-7542", "url": "https://bugzilla.suse.com/1049882" }, { "category": "external", "summary": "SUSE Bug 1061936 for CVE-2017-7542", "url": "https://bugzilla.suse.com/1061936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-7542" }, { "cve": "CVE-2017-8824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8824" } ], "notes": [ { "category": "general", "text": "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8824", "url": "https://www.suse.com/security/cve/CVE-2017-8824" }, { "category": "external", "summary": "SUSE Bug 1070771 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1070771" }, { "category": "external", "summary": "SUSE Bug 1076734 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1076734" }, { "category": "external", "summary": "SUSE Bug 1092904 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1092904" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-8824" }, { "cve": "CVE-2017-8831", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8831" } ], "notes": [ { "category": "general", "text": "The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8831", "url": "https://www.suse.com/security/cve/CVE-2017-8831" }, { "category": "external", "summary": "SUSE Bug 1037994 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1037994" }, { "category": "external", "summary": "SUSE Bug 1061936 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1061936" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-8831" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-10322", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10322" } ], "notes": [ { "category": "general", "text": "The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10322", "url": "https://www.suse.com/security/cve/CVE-2018-10322" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10322", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090749 for CVE-2018-10322", "url": "https://bugzilla.suse.com/1090749" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10322" }, { "cve": "CVE-2018-10323", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10323" } ], "notes": [ { "category": "general", "text": "The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10323", "url": "https://www.suse.com/security/cve/CVE-2018-10323" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10323", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090717 for CVE-2018-10323", "url": "https://bugzilla.suse.com/1090717" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10323" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-1118", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1118" } ], "notes": [ { "category": "general", "text": "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1118", "url": "https://www.suse.com/security/cve/CVE-2018-1118" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1118", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092472 for CVE-2018-1118", "url": "https://bugzilla.suse.com/1092472" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-1118" }, { "cve": "CVE-2018-12232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12232" } ], "notes": [ { "category": "general", "text": "In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat\u0027s execution, leading to a NULL pointer dereference and system crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12232", "url": "https://www.suse.com/security/cve/CVE-2018-12232" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097593 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1097593" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1127757 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1127757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-12232" }, { "cve": "CVE-2018-12714", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12714" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via crafted perf_event_open and mmap system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12714", "url": "https://www.suse.com/security/cve/CVE-2018-12714" }, { "category": "external", "summary": "SUSE Bug 1098933 for CVE-2018-12714", "url": "https://bugzilla.suse.com/1098933" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12714" }, { "cve": "CVE-2018-13053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13053" } ], "notes": [ { "category": "general", "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13053", "url": "https://www.suse.com/security/cve/CVE-2018-13053" }, { "category": "external", "summary": "SUSE Bug 1099924 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1099924" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-13053" }, { "cve": "CVE-2018-18710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-18710" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-18710", "url": "https://www.suse.com/security/cve/CVE-2018-18710" }, { "category": "external", "summary": "SUSE Bug 1113751 for CVE-2018-18710", "url": "https://bugzilla.suse.com/1113751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-18710" }, { "cve": "CVE-2018-19824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19824" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19824", "url": "https://www.suse.com/security/cve/CVE-2018-19824" }, { "category": "external", "summary": "SUSE Bug 1118152 for CVE-2018-19824", "url": "https://bugzilla.suse.com/1118152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19824" }, { "cve": "CVE-2018-5332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5332" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5332", "url": "https://www.suse.com/security/cve/CVE-2018-5332" }, { "category": "external", "summary": "SUSE Bug 1075621 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1075621" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-5332" }, { "cve": "CVE-2018-5333", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5333" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5333", "url": "https://www.suse.com/security/cve/CVE-2018-5333" }, { "category": "external", "summary": "SUSE Bug 1075617 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1075617" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-5333" }, { "cve": "CVE-2018-8043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8043" } ], "notes": [ { "category": "general", "text": "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8043", "url": "https://www.suse.com/security/cve/CVE-2018-8043" }, { "category": "external", "summary": "SUSE Bug 1084829 for CVE-2018-8043", "url": "https://bugzilla.suse.com/1084829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 0, "baseSeverity": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-8043" }, { "cve": "CVE-2018-8087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8087" } ], "notes": [ { "category": "general", "text": "Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8087", "url": "https://www.suse.com/security/cve/CVE-2018-8087" }, { "category": "external", "summary": "SUSE Bug 1085053 for CVE-2018-8087", "url": "https://bugzilla.suse.com/1085053" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-8087" }, { "cve": "CVE-2018-8822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8822" } ], "notes": [ { "category": "general", "text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8822", "url": "https://www.suse.com/security/cve/CVE-2018-8822" }, { "category": "external", "summary": "SUSE Bug 1086162 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1086162" }, { "category": "external", "summary": "SUSE Bug 1090404 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1090404" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-8822" }, { "cve": "CVE-2019-10207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10207" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10207", "url": "https://www.suse.com/security/cve/CVE-2019-10207" }, { "category": "external", "summary": "SUSE Bug 1123959 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1123959" }, { "category": "external", "summary": "SUSE Bug 1142857 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1142857" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-10207" }, { "cve": "CVE-2019-11477", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11477" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11477", "url": "https://www.suse.com/security/cve/CVE-2019-11477" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1153242 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1153242" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11477" }, { "cve": "CVE-2019-11478", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11478" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11478", "url": "https://www.suse.com/security/cve/CVE-2019-11478" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11478" }, { "cve": "CVE-2019-11479", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11479" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11479", "url": "https://www.suse.com/security/cve/CVE-2019-11479" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11479" }, { "cve": "CVE-2019-14615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14615" } ], "notes": [ { "category": "general", "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14615", "url": "https://www.suse.com/security/cve/CVE-2019-14615" }, { "category": "external", "summary": "SUSE Bug 1160195 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1160195" }, { "category": "external", "summary": "SUSE Bug 1165881 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1165881" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-14615" }, { "cve": "CVE-2019-14814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14814" } ], "notes": [ { "category": "general", "text": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14814", "url": "https://www.suse.com/security/cve/CVE-2019-14814" }, { "category": "external", "summary": "SUSE Bug 1146512 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1146512" }, { "category": "external", "summary": "SUSE Bug 1173664 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173664" }, { "category": "external", "summary": "SUSE Bug 1173665 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-14814" }, { "cve": "CVE-2019-14896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14896" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14896", "url": "https://www.suse.com/security/cve/CVE-2019-14896" }, { "category": "external", "summary": "SUSE Bug 1157157 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1157157" }, { "category": "external", "summary": "SUSE Bug 1160468 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1160468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-14896" }, { "cve": "CVE-2019-15030", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15030" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15030", "url": "https://www.suse.com/security/cve/CVE-2019-15030" }, { "category": "external", "summary": "SUSE Bug 1149713 for CVE-2019-15030", "url": "https://bugzilla.suse.com/1149713" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15030" }, { "cve": "CVE-2019-15031", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15031" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15031", "url": "https://www.suse.com/security/cve/CVE-2019-15031" }, { "category": "external", "summary": "SUSE Bug 1149713 for CVE-2019-15031", "url": "https://bugzilla.suse.com/1149713" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15031" }, { "cve": "CVE-2019-15098", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15098" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15098", "url": "https://www.suse.com/security/cve/CVE-2019-15098" }, { "category": "external", "summary": "SUSE Bug 1146378 for CVE-2019-15098", "url": "https://bugzilla.suse.com/1146378" }, { "category": "external", "summary": "SUSE Bug 1146543 for CVE-2019-15098", "url": "https://bugzilla.suse.com/1146543" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15098" }, { "cve": "CVE-2019-15099", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15099" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15099", "url": "https://www.suse.com/security/cve/CVE-2019-15099" }, { "category": "external", "summary": "SUSE Bug 1146368 for CVE-2019-15099", "url": "https://bugzilla.suse.com/1146368" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15099" }, { "cve": "CVE-2019-15290", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15290" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15290", "url": "https://www.suse.com/security/cve/CVE-2019-15290" }, { "category": "external", "summary": "SUSE Bug 1146378 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146378" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146543 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146543" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15290" }, { "cve": "CVE-2019-15504", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15504" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15504", "url": "https://www.suse.com/security/cve/CVE-2019-15504" }, { "category": "external", "summary": "SUSE Bug 1147116 for CVE-2019-15504", "url": "https://bugzilla.suse.com/1147116" }, { "category": "external", "summary": "SUSE Bug 1185852 for CVE-2019-15504", "url": "https://bugzilla.suse.com/1185852" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-15504" }, { "cve": "CVE-2019-15902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15902" } ], "notes": [ { "category": "general", "text": "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15902", "url": "https://www.suse.com/security/cve/CVE-2019-15902" }, { "category": "external", "summary": "SUSE Bug 1149376 for CVE-2019-15902", "url": "https://bugzilla.suse.com/1149376" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-15902", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15902" }, { "cve": "CVE-2019-16231", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16231" } ], "notes": [ { "category": "general", "text": "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16231", "url": "https://www.suse.com/security/cve/CVE-2019-16231" }, { "category": "external", "summary": "SUSE Bug 1150466 for CVE-2019-16231", "url": "https://bugzilla.suse.com/1150466" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-16231" }, { "cve": "CVE-2019-16232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16232" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16232", "url": "https://www.suse.com/security/cve/CVE-2019-16232" }, { "category": "external", "summary": "SUSE Bug 1150465 for CVE-2019-16232", "url": "https://bugzilla.suse.com/1150465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-16232" }, { "cve": "CVE-2019-16234", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16234" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16234", "url": "https://www.suse.com/security/cve/CVE-2019-16234" }, { "category": "external", "summary": "SUSE Bug 1150452 for CVE-2019-16234", "url": "https://bugzilla.suse.com/1150452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-16234" }, { "cve": "CVE-2019-17133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17133" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17133", "url": "https://www.suse.com/security/cve/CVE-2019-17133" }, { "category": "external", "summary": "SUSE Bug 1153158 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153158" }, { "category": "external", "summary": "SUSE Bug 1153161 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-17133" }, { "cve": "CVE-2019-17666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17666" } ], "notes": [ { "category": "general", "text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17666", "url": "https://www.suse.com/security/cve/CVE-2019-17666" }, { "category": "external", "summary": "SUSE Bug 1154372 for CVE-2019-17666", "url": "https://bugzilla.suse.com/1154372" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-17666" }, { "cve": "CVE-2019-18808", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18808" } ], "notes": [ { "category": "general", "text": "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18808", "url": "https://www.suse.com/security/cve/CVE-2019-18808" }, { "category": "external", "summary": "SUSE Bug 1156259 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1156259" }, { "category": "external", "summary": "SUSE Bug 1189884 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1189884" }, { "category": "external", "summary": "SUSE Bug 1190534 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1190534" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18808" }, { "cve": "CVE-2019-18812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18812" } ], "notes": [ { "category": "general", "text": "A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18812", "url": "https://www.suse.com/security/cve/CVE-2019-18812" }, { "category": "external", "summary": "SUSE Bug 1156277 for CVE-2019-18812", "url": "https://bugzilla.suse.com/1156277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18812" }, { "cve": "CVE-2019-18813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18813" } ], "notes": [ { "category": "general", "text": "A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18813", "url": "https://www.suse.com/security/cve/CVE-2019-18813" }, { "category": "external", "summary": "SUSE Bug 1156278 for CVE-2019-18813", "url": "https://bugzilla.suse.com/1156278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18813" }, { "cve": "CVE-2019-19252", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19252" } ], "notes": [ { "category": "general", "text": "vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19252", "url": "https://www.suse.com/security/cve/CVE-2019-19252" }, { "category": "external", "summary": "SUSE Bug 1157813 for CVE-2019-19252", "url": "https://bugzilla.suse.com/1157813" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19252" }, { "cve": "CVE-2019-19332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19332" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19332", "url": "https://www.suse.com/security/cve/CVE-2019-19332" }, { "category": "external", "summary": "SUSE Bug 1158827 for CVE-2019-19332", "url": "https://bugzilla.suse.com/1158827" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19332" }, { "cve": "CVE-2019-19338", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19338" } ], "notes": [ { "category": "general", "text": "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has \u0027TSX\u0027 enabled. Confidentiality of data is the highest threat associated with this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19338", "url": "https://www.suse.com/security/cve/CVE-2019-19338" }, { "category": "external", "summary": "SUSE Bug 1158954 for CVE-2019-19338", "url": "https://bugzilla.suse.com/1158954" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19338" }, { "cve": "CVE-2019-3016", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3016" } ], "notes": [ { "category": "general", "text": "In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3016", "url": "https://www.suse.com/security/cve/CVE-2019-3016" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2019-3016", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1161154 for CVE-2019-3016", "url": "https://bugzilla.suse.com/1161154" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3016" }, { "cve": "CVE-2019-3846", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3846" } ], "notes": [ { "category": "general", "text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3846", "url": "https://www.suse.com/security/cve/CVE-2019-3846" }, { "category": "external", "summary": "SUSE Bug 1136424 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136424" }, { "category": "external", "summary": "SUSE Bug 1136446 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136446" }, { "category": "external", "summary": "SUSE Bug 1156330 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1156330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3846" }, { "cve": "CVE-2019-3882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3882" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3882", "url": "https://www.suse.com/security/cve/CVE-2019-3882" }, { "category": "external", "summary": "SUSE Bug 1131416 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131416" }, { "category": "external", "summary": "SUSE Bug 1131427 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131427" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1133319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3882" }, { "cve": "CVE-2019-3887", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3887" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0\u0027s APIC register values via L2 guest, when \u0027virtualize x2APIC mode\u0027 is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3887", "url": "https://www.suse.com/security/cve/CVE-2019-3887" }, { "category": "external", "summary": "SUSE Bug 1131800 for CVE-2019-3887", "url": "https://bugzilla.suse.com/1131800" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3887" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-7222" }, { "cve": "CVE-2019-8564", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8564" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8564", "url": "https://www.suse.com/security/cve/CVE-2019-8564" }, { "category": "external", "summary": "SUSE Bug 1132673 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132673" }, { "category": "external", "summary": "SUSE Bug 1132828 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132828" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-8564" }, { "cve": "CVE-2019-8912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8912" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8912", "url": "https://www.suse.com/security/cve/CVE-2019-8912" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1126284 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1126284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-8912" }, { "cve": "CVE-2019-9500", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9500" } ], "notes": [ { "category": "general", "text": "The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9500", "url": "https://www.suse.com/security/cve/CVE-2019-9500" }, { "category": "external", "summary": "SUSE Bug 1132681 for CVE-2019-9500", "url": "https://bugzilla.suse.com/1132681" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-9500" }, { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14386" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14386", "url": "https://www.suse.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "SUSE Bug 1176069 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176069" }, { "category": "external", "summary": "SUSE Bug 1176072 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14386" }, { "cve": "CVE-2020-24586", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24586" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24586", "url": "https://www.suse.com/security/cve/CVE-2020-24586" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24586" }, { "cve": "CVE-2020-24587", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24587" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24587", "url": "https://www.suse.com/security/cve/CVE-2020-24587" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1185862 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185862" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24587" }, { "cve": "CVE-2020-24588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24588" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24588", "url": "https://www.suse.com/security/cve/CVE-2020-24588" }, { "category": "external", "summary": "SUSE Bug 1185861 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1185861" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1192868" }, { "category": "external", "summary": "SUSE Bug 1199701 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1199701" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24588" }, { "cve": "CVE-2020-25639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25639" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25639", "url": "https://www.suse.com/security/cve/CVE-2020-25639" }, { "category": "external", "summary": "SUSE Bug 1176846 for CVE-2020-25639", "url": "https://bugzilla.suse.com/1176846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25639" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-26141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26141" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26141", "url": "https://www.suse.com/security/cve/CVE-2020-26141" }, { "category": "external", "summary": "SUSE Bug 1185987 for CVE-2020-26141", "url": "https://bugzilla.suse.com/1185987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-26141" }, { "cve": "CVE-2020-2732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2732" } ], "notes": [ { "category": "general", "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2732", "url": "https://www.suse.com/security/cve/CVE-2020-2732" }, { "category": "external", "summary": "SUSE Bug 1163971 for CVE-2020-2732", "url": "https://bugzilla.suse.com/1163971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2732" }, { "cve": "CVE-2020-29660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29660" } ], "notes": [ { "category": "general", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29660", "url": "https://www.suse.com/security/cve/CVE-2020-29660" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-29660" }, { "cve": "CVE-2020-29661", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29661" } ], "notes": [ { "category": "general", "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29661", "url": "https://www.suse.com/security/cve/CVE-2020-29661" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179877" }, { "category": "external", "summary": "SUSE Bug 1214268 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1214268" }, { "category": "external", "summary": "SUSE Bug 1218966 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1218966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-29661" }, { "cve": "CVE-2020-8648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8648" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8648", "url": "https://www.suse.com/security/cve/CVE-2020-8648" }, { "category": "external", "summary": "SUSE Bug 1162928 for CVE-2020-8648", "url": "https://bugzilla.suse.com/1162928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-8648" }, { "cve": "CVE-2020-8694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8694" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8694", "url": "https://www.suse.com/security/cve/CVE-2020-8694" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178700 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178700" }, { "category": "external", "summary": "SUSE Bug 1179661 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1179661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-8694" }, { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-23133" }, { "cve": "CVE-2021-26708", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26708" } ], "notes": [ { "category": "general", "text": "A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26708", "url": "https://www.suse.com/security/cve/CVE-2021-26708" }, { "category": "external", "summary": "SUSE Bug 1181806 for CVE-2021-26708", "url": "https://bugzilla.suse.com/1181806" }, { "category": "external", "summary": "SUSE Bug 1183298 for CVE-2021-26708", "url": "https://bugzilla.suse.com/1183298" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-26708" }, { "cve": "CVE-2021-28971", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-28971" } ], "notes": [ { "category": "general", "text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-28971", "url": "https://www.suse.com/security/cve/CVE-2021-28971" }, { "category": "external", "summary": "SUSE Bug 1184196 for CVE-2021-28971", "url": "https://bugzilla.suse.com/1184196" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-28971" }, { "cve": "CVE-2021-32606", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32606" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32606", "url": "https://www.suse.com/security/cve/CVE-2021-32606" }, { "category": "external", "summary": "SUSE Bug 1185953 for CVE-2021-32606", "url": "https://bugzilla.suse.com/1185953" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-32606" }, { "cve": "CVE-2021-33909", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33909" } ], "notes": [ { "category": "general", "text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33909", "url": "https://www.suse.com/security/cve/CVE-2021-33909" }, { "category": "external", "summary": "SUSE Bug 1188062 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188062" }, { "category": "external", "summary": "SUSE Bug 1188063 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188063" }, { "category": "external", "summary": "SUSE Bug 1188257 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188257" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1189302" }, { "category": "external", "summary": "SUSE Bug 1190859 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1190859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-33909" }, { "cve": "CVE-2021-3483", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3483" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3483", "url": "https://www.suse.com/security/cve/CVE-2021-3483" }, { "category": "external", "summary": "SUSE Bug 1184393 for CVE-2021-3483", "url": "https://bugzilla.suse.com/1184393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3483" }, { "cve": "CVE-2021-3489", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3489" } ], "notes": [ { "category": "general", "text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3489", "url": "https://www.suse.com/security/cve/CVE-2021-3489" }, { "category": "external", "summary": "SUSE Bug 1185640 for CVE-2021-3489", "url": "https://bugzilla.suse.com/1185640" }, { "category": "external", "summary": "SUSE Bug 1185856 for CVE-2021-3489", "url": "https://bugzilla.suse.com/1185856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3489" }, { "cve": "CVE-2021-3490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3490" } ], "notes": [ { "category": "general", "text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3490", "url": "https://www.suse.com/security/cve/CVE-2021-3490" }, { "category": "external", "summary": "SUSE Bug 1185641 for CVE-2021-3490", "url": "https://bugzilla.suse.com/1185641" }, { "category": "external", "summary": "SUSE Bug 1185796 for CVE-2021-3490", "url": "https://bugzilla.suse.com/1185796" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3490" }, { "cve": "CVE-2021-3491", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3491" } ], "notes": [ { "category": "general", "text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3491", "url": "https://www.suse.com/security/cve/CVE-2021-3491" }, { "category": "external", "summary": "SUSE Bug 1185642 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1185642" }, { "category": "external", "summary": "SUSE Bug 1187090 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1187090" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3491" }, { "cve": "CVE-2021-3640", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3640" } ], "notes": [ { "category": "general", "text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3640", "url": "https://www.suse.com/security/cve/CVE-2021-3640" }, { "category": "external", "summary": "SUSE Bug 1188172 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1188172" }, { "category": "external", "summary": "SUSE Bug 1188613 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1188613" }, { "category": "external", "summary": "SUSE Bug 1191530 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1191530" }, { "category": "external", "summary": "SUSE Bug 1196810 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1196810" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3640" }, { "cve": "CVE-2021-3653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3653" } ], "notes": [ { "category": "general", "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3653", "url": "https://www.suse.com/security/cve/CVE-2021-3653" }, { "category": "external", "summary": "SUSE Bug 1189399 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1189399" }, { "category": "external", "summary": "SUSE Bug 1189420 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1189420" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3653" }, { "cve": "CVE-2021-3656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3656", "url": "https://www.suse.com/security/cve/CVE-2021-3656" }, { "category": "external", "summary": "SUSE Bug 1189400 for CVE-2021-3656", "url": "https://bugzilla.suse.com/1189400" }, { "category": "external", "summary": "SUSE Bug 1189418 for CVE-2021-3656", "url": "https://bugzilla.suse.com/1189418" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3656" }, { "cve": "CVE-2021-3744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3744" } ], "notes": [ { "category": "general", "text": "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3744", "url": "https://www.suse.com/security/cve/CVE-2021-3744" }, { "category": "external", "summary": "SUSE Bug 1189884 for CVE-2021-3744", "url": "https://bugzilla.suse.com/1189884" }, { "category": "external", "summary": "SUSE Bug 1190534 for CVE-2021-3744", "url": "https://bugzilla.suse.com/1190534" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3744" }, { "cve": "CVE-2021-3753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3753" } ], "notes": [ { "category": "general", "text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3753", "url": "https://www.suse.com/security/cve/CVE-2021-3753" }, { "category": "external", "summary": "SUSE Bug 1190025 for CVE-2021-3753", "url": "https://bugzilla.suse.com/1190025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3753" }, { "cve": "CVE-2021-37576", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-37576" } ], "notes": [ { "category": "general", "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-37576", "url": "https://www.suse.com/security/cve/CVE-2021-37576" }, { "category": "external", "summary": "SUSE Bug 1188838 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1188838" }, { "category": "external", "summary": "SUSE Bug 1188842 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1188842" }, { "category": "external", "summary": "SUSE Bug 1190276 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1190276" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-37576" }, { "cve": "CVE-2021-3759", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3759" } ], "notes": [ { "category": "general", "text": "A memory overflow vulnerability was found in the Linux kernel\u0027s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3759", "url": "https://www.suse.com/security/cve/CVE-2021-3759" }, { "category": "external", "summary": "SUSE Bug 1190115 for CVE-2021-3759", "url": "https://bugzilla.suse.com/1190115" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3759" }, { "cve": "CVE-2021-38166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-38166" } ], "notes": [ { "category": "general", "text": "In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-38166", "url": "https://www.suse.com/security/cve/CVE-2021-38166" }, { "category": "external", "summary": "SUSE Bug 1189233 for CVE-2021-38166", "url": "https://bugzilla.suse.com/1189233" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-38166" } ] }
opensuse-su-2020:1325-1
Vulnerability from csaf_opensuse
Published
2020-09-02 14:23
Modified
2020-09-02 14:23
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-3639: Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may have allowed unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bnc#1085308 bnc#1087082 bnc#1172782 bnc#1172783). Mitigations for Arm had not been included yet.
- CVE-2020-14314: Fixed potential negative array index in do_split() (bsc#1173798).
- CVE-2020-14331: Fixed a buffer over write in vgacon_scroll (bnc#1174205).
- CVE-2020-14356: A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system (bnc#1175213).
- CVE-2020-1749: Some ipv6 protocols were not encrypted over ipsec tunnels (bsc#1165629).
- CVE-2020-24394: fs/nfsd/vfs.c (in the NFS server) could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered (bnc#1175518).
The following non-security bugs were fixed:
- ACPI: kABI fixes for subsys exports (bsc#1174968).
- ACPI / LPSS: Resume BYT/CHT I2C controllers from resume_noirq (bsc#1174968).
- ACPI / LPSS: Use acpi_lpss_* instead of acpi_subsys_* functions for hibernate (bsc#1174968).
- ACPI: PM: Introduce 'poweroff' callbacks for ACPI PM domain and LPSS (bsc#1174968).
- ACPI: PM: Simplify and fix PM domain hibernation callbacks (bsc#1174968).
- af_key: pfkey_dump needs parameter validation (git-fixes).
- agp/intel: Fix a memory leak on module initialisation failure (git-fixes).
- ALSA: core: pcm_iec958: fix kernel-doc (bsc#1111666).
- ALSA: echoaduio: Drop superfluous volatile modifier (bsc#1111666).
- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (bsc#1111666).
- ALSA: hda: Add support for Loongson 7A1000 controller (bsc#1111666).
- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (bsc#1111666).
- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (bsc#1111666).
- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (bsc#1111666).
- ALSA: hda: fix snd_hda_codec_cleanup() documentation (bsc#1111666).
- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (bsc#1111666).
- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (bsc#1111666).
- ALSA: hda/realtek: Add model alc298-samsung-headphone (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex Book (git-fixes).
- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (bsc#1111666).
- ALSA: hda/realtek - Fix unused variable warning (bsc#1111666).
- ALSA: hda - reverse the setting value in the micmute_led_set (bsc#1111666).
- ALSA: pci: delete repeated words in comments (bsc#1111666).
- ALSA: seq: oss: Serialize ioctls (bsc#1111666).
- ALSA: usb-audio: Add capture support for Saffire 6 (USB 1.1) (git-fixes).
- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (bsc#1111666).
- ALSA: usb-audio: add startech usb audio dock name (bsc#1111666).
- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (bsc#1111666).
- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (bsc#1111666).
- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (bsc#1111666).
- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (bsc#1111666).
- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).
- ALSA: usb-audio: fix spelling mistake 'buss' -> 'bus' (bsc#1111666).
- ALSA: usb-audio: ignore broken processing/extension unit (git-fixes).
- ALSA: usb-audio: Update documentation comment for MS2109 quirk (git-fixes).
- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (bsc#1111666).
- ALSA: usb/line6: remove 'defined but not used' warning (bsc#1111666).
- arm64: Add MIDR encoding for HiSilicon Taishan CPUs (bsc#1174547).
- arm64: Add MIDR encoding for NVIDIA CPUs (bsc#1174547).
- arm64: add sysfs vulnerability show for meltdown (bsc#1174547).
- arm64: Add sysfs vulnerability show for spectre-v1 (bsc#1174547).
- arm64: add sysfs vulnerability show for spectre-v2 (bsc#1174547).
- arm64: add sysfs vulnerability show for speculative store bypass (bsc#1174547).
- arm64: Advertise mitigation of Spectre-v2, or lack thereof (bsc#1174547)
- arm64: Always enable spectre-v2 vulnerability detection (bsc#1174547).
- arm64: Always enable ssb vulnerability detection (bsc#1174547).
- arm64: backtrace: Do not bother trying to unwind the userspace stack (bsc#1175397).
- arm64: capabilities: Add NVIDIA Denver CPU to bp_harden list (bsc#1174547).
- arm64: capabilities: Merge duplicate Cavium erratum entries (bsc#1174547).
- arm64: capabilities: Merge entries for ARM64_WORKAROUND_CLEAN_CACHE (bsc#1174547).
- arm64: cpufeature: Enable Qualcomm Falkor/Kryo errata 1003 (bsc#1175398).
- arm64: Do not mask out PTE_RDONLY in pte_same() (bsc#1175393).
- arm64: enable generic CPU vulnerabilites support (bsc#1174547). Update config/arm64/default
- arm64: Ensure VM_WRITE|VM_SHARED ptes are clean by default (bsc#1175394).
- arm64: errata: Do not define type field twice for arm64_errata entries (bsc#1174547).
- arm64: errata: Update stale comment (bsc#1174547).
- arm64: Get rid of __smccc_workaround_1_hvc_* (bsc#1174547).
- arm64: kpti: Avoid rewriting early page tables when KASLR is enabled (bsc#1174547).
- arm64: kpti: Update arm64_kernel_use_ng_mappings() when forced on (bsc#1174547).
- arm64: kpti: Whitelist Cortex-A CPUs that do not implement the CSV3 field (bsc#1174547).
- arm64: kpti: Whitelist HiSilicon Taishan v110 CPUs (bsc#1174547).
- arm64: KVM: Avoid setting the upper 32 bits of VTCR_EL2 to 1 (bsc#1133021).
- arm64: KVM: Guests can skip __install_bp_hardening_cb()s HYP work (bsc#1174547).
- arm64: KVM: Use SMCCC_ARCH_WORKAROUND_1 for Falkor BP hardening (bsc#1174547).
- arm64: mm: Fix pte_mkclean, pte_mkdirty semantics (bsc#1175526).
- arm64: Provide a command line to disable spectre_v2 mitigation (bsc#1174547).
- arm64: Silence clang warning on mismatched value/register sizes (bsc#1175396).
- arm64/speculation: Support 'mitigations=' cmdline option (bsc#1174547).
- arm64: ssbd: explicitly depend on <linux/prctl.h> (bsc#1175399).
- arm64: ssbs: Do not treat CPUs with SSBS as unaffected by SSB (bsc#1174547).
- arm64: ssbs: Fix context-switch when SSBS is present on all CPUs (bsc#1175669).
- arm64/sve: <uapi/asm/ptrace.h> should not depend on <uapi/linux/prctl.h> (bsc#1175401).
- arm64/sve: Fix wrong free for task->thread.sve_state (bsc#1175400).
- arm64: tlbflush: avoid writing RES0 bits (bsc#1175402).
- arm64: Use firmware to detect CPUs that are not affected by Spectre-v2 (bsc#1174547).
- ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17 (bsc#1133021).
- ARM: KVM: invalidate icache on guest exit for Cortex-A15 (bsc#1133021).
- ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15 (bsc#1133021).
- ASoC: hda/tegra: Set buffer alignment to 128 bytes (bsc#1111666).
- ASoC: intel: Fix memleak in sst_media_open (git-fixes).
- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).
- AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).
- AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).
- AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).
- ax88172a: fix ax88172a_unbind() failures (git-fixes).
- b43: Remove uninitialized_var() usage (git-fixes).
- bcache: allocate meta data pages as compound pages (bsc#1172873).
- block: check queue's limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).
- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).
- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (bsc#1111666).
- Bluetooth: Fix update of connection state in `hci_encrypt_cfm` (git-fixes).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (bsc#1111666).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (bsc#1111666).
- bonding: fix active-backup failover for current ARP slave (bsc#1174771).
- bonding: fix a potential double-unregister (git-fixes).
- bonding: show saner speed for broadcast mode (git-fixes).
- bpf: Fix map leak in HASH_OF_MAPS map (git-fixes).
- brcmfmac: keep SDIO watchdog running when console_interval is non-zero (bsc#1111666).
- brcmfmac: set state of hanger slot to FREE when flushing PSQ (bsc#1111666).
- brcmfmac: To fix Bss Info flag definition Bug (bsc#1111666).
- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).
- btrfs: fix block group leak when removing fails (bsc#1175149).
- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).
- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).
- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).
- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).
- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).
- btrfs: fix memory leaks after failure to lookup checksums during inode logging (bsc#1175550).
- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).
- btrfs: fix race between block group removal and block group creation (bsc#1175149).
- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).
- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).
- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).
- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).
- btrfs: Open code btrfs_write_and_wait_marked_extents (bsc#1175149).
- btrfs: Rename and export clear_btree_io_tree (bsc#1175149).
- btrfs: treat RWF_{,D}SYNC writes as sync for CRCs (bsc#1175493).
- cfg80211: check vendor command doit pointer before use (git-fixes).
- char: virtio: Select VIRTIO from VIRTIO_CONSOLE (bsc#1175667).
- cifs: document and cleanup dfs mount (bsc#1144333 bsc#1172428).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1144333 bsc#1172428).
- cifs: fix double free error on share and prefix (bsc#1144333 bsc#1172428).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1144333 bsc#1172428).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1144333 bsc#1172428).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1144333 bsc#1172428).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1144333 bsc#1172428).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1144333 bsc#1172428).
- cifs: rename reconn_inval_dfs_target() (bsc#1144333 bsc#1172428).
- clk: at91: clk-generated: check best_rate against ranges (bsc#1111666).
- clk: clk-atlas6: fix return value check in atlas6_clk_init() (bsc#1111666).
- clk: iproc: round clock rate to the closest (bsc#1111666).
- clk: spear: Remove uninitialized_var() usage (git-fixes).
- clk: st: Remove uninitialized_var() usage (git-fixes).
- console: newport_con: fix an issue about leak related system resources (git-fixes).
- crypto: ccp - Fix use of merged scatterlists (git-fixes).
- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).
- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).
- dev: Defer free of skbs in flush_backlog (git-fixes).
- device property: Fix the secondary firmware node handling in set_primary_fwnode() (git-fixes).
- devres: keep both device name and resource name in pretty name (git-fixes).
- dlm: Fix kobject memleak (bsc#1175768).
- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).
- Documentation/networking: Add net DIM documentation (bsc#1174852).
- dpaa2-eth: Fix passing zero to 'PTR_ERR' warning (bsc#1175403).
- dpaa2-eth: free already allocated channels on probe defer (bsc#1175404).
- dpaa2-eth: prevent array underflow in update_cls_rule() (bsc#1175405).
- dpaa_eth: add dropped frames to percpu ethtool stats (bsc#1174550).
- dpaa_eth: add newline in dev_err() msg (bsc#1174550).
- dpaa_eth: avoid timestamp read on error paths (bsc#1175406).
- dpaa_eth: change DMA device (bsc#1174550).
- dpaa_eth: cleanup skb_to_contig_fd() (bsc#1174550).
- dpaa_eth: defer probing after qbman (bsc#1174550).
- dpaa_eth: extend delays in ndo_stop (bsc#1174550).
- dpaa_eth: fix DMA mapping leak (bsc#1174550).
- dpaa_eth: Fix one possible memleak in dpaa_eth_probe (bsc#1174550).
- dpaa_eth: FMan erratum A050385 workaround (bsc#1174550).
- dpaa_eth: perform DMA unmapping before read (bsc#1175407).
- dpaa_eth: register a device link for the qman portal used (bsc#1174550).
- dpaa_eth: remove netdev_err() for user errors (bsc#1174550).
- dpaa_eth: remove redundant code (bsc#1174550).
- dpaa_eth: simplify variables used in dpaa_cleanup_tx_fd() (bsc#1174550).
- dpaa_eth: use a page to store the SGT (bsc#1174550).
- dpaa_eth: use fd information in dpaa_cleanup_tx_fd() (bsc#1174550).
- dpaa_eth: use only one buffer pool per interface (bsc#1174550).
- dpaa_eth: use page backed rx buffers (bsc#1174550).
- driver core: Avoid binding drivers to dead devices (git-fixes).
- Drivers: hv: balloon: Remove dependencies on guest page size (git-fixes).
- Drivers: hv: vmbus: Fix virt_to_hvpfn() for X86_PAE (git-fixes).
- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127, bsc#1175128).
- Drivers: hv: vmbus: Remove the undesired put_cpu_ptr() in hv_synic_cleanup() (git-fixes).
- drivers/perf: hisi: Fix typo in events attribute array (bsc#1175408).
- drivers/perf: hisi: Fixup one DDRC PMU register offset (bsc#1175410).
- drivers/perf: hisi: Fix wrong value for all counters enable (bsc#1175409).
- drm: Added orientation quirk for ASUS tablet model T103HAF (bsc#1111666).
- drm/amd/display: fix pow() crashing when given base 0 (git-fixes).
- drm/amdgpu: avoid dereferencing a NULL pointer (bsc#1111666).
- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (bsc#1111666).
- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (bsc#1113956)
- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).
- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1113956)
- drm/arm: fix unintentional integer overflow on left shift (git-fixes).
- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1113956)
- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).
- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1113956)
- drm/debugfs: fix plain echo to connector 'force' attribute (bsc#1111666).
- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).
- drm/etnaviv: fix ref count leak via pm_runtime_get_sync (bsc#1111666).
- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (bsc#1112178)
- drm: hold gem reference until object is no longer accessed (bsc#1113956)
- drm/imx: fix use after free (git-fixes).
- drm/imx: imx-ldb: Disable both channels for split mode in enc->disable() (git-fixes).
- drm/imx: tve: fix regulator_disable error path (git-fixes).
- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).
- drm/msm/adreno: fix updating ring fence (git-fixes).
- drm/msm: ratelimit crtc event overflow error (bsc#1111666).
- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).
- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).
- drm/nouveau: fix multiple instances of reference count leaks (bsc#1111666).
- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).
- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).
- drm/radeon: disable AGP by default (bsc#1111666).
- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).
- drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync (bsc#1111666).
- drm/rockchip: fix VOP_WIN_GET macro (bsc#1175411).
- drm/tilcdc: fix leak & null ref in panel_connector_get_modes (bsc#1111666).
- drm/ttm/nouveau: do not call tt destroy callback on alloc failure (bsc#1175232).
- drm/vmwgfx: Fix two list_for_each loop exit tests (bsc#1111666).
- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (bsc#1111666).
- drm/xen-front: Fix misused IS_ERR_OR_NULL checks (bsc#1065600).
- ext4: check journal inode extents more carefully (bsc#1173485).
- ext4: do not allow overlapping system zones (bsc#1173485).
- ext4: fix checking of directory entry validity for inline directories (bsc#1175771).
- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).
- fbdev: Detect integer underflow at 'struct fbcon_ops'->clear_margins. (bsc#1112178)
- firmware: google: check if size is valid when decoding VPD data (git-fixes).
- firmware: google: increment VPD key_len properly (git-fixes).
- fsl/fman: add API to get the device behind a fman port (bsc#1174550).
- fsl/fman: check dereferencing null pointer (git-fixes).
- fsl/fman: detect FMan erratum A050385 (bsc#1174550).
- fsl/fman: do not touch liodn base regs reserved on non-PAMU SoCs (bsc#1174550).
- fsl/fman: fix dereference null return value (git-fixes).
- fsl/fman: fix eth hash table allocation (git-fixes).
- fsl/fman: fix unreachable code (git-fixes).
- fsl/fman: remove unused struct member (bsc#1174550).
- fsl/fman: use 32-bit unsigned integer (git-fixes).
- fuse: fix memleak in cuse_channel_open (bsc#1174926).
- fuse: fix missing unlock_page in fuse_writepage() (bsc#1174904).
- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175062).
- fuse: fix weird page warning (bsc#1175063).
- fuse: flush dirty data/metadata before non-truncate setattr (bsc#1175064).
- fuse: truncate pending writes on O_TRUNC (bsc#1175065).
- fuse: verify attributes (bsc#1175066).
- fuse: verify nlink (bsc#1175067).
- genetlink: remove genl_bind (networking-stable-20_07_17).
- go7007: add sanity checking for endpoints (git-fixes).
- gpu: host1x: debug: Fix multiple channels emitting messages simultaneously (bsc#1111666).
- hv_balloon: Balloon up according to request page number (git-fixes).
- hv_balloon: Use a static page for the balloon_up send buffer (git-fixes).
- hv_netvsc: Allow scatter-gather feature to be tunable (git-fixes).
- hv_netvsc: do not use VF device if link is down (git-fixes).
- hv_netvsc: Fix a warning of suspicious RCU usage (git-fixes).
- hv_netvsc: Fix error handling in netvsc_attach() (git-fixes).
- hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (git-fixes).
- hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (git-fixes).
- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (git-fixes).
- hv_netvsc: flag software created hash value (git-fixes).
- hv_netvsc: Remove 'unlikely' from netvsc_select_queue (git-fixes).
- i2c: rcar: in slave mode, clear NACK earlier (git-fixes).
- i2c: rcar: slave: only send STOP event when we have been addressed (bsc#1111666).
- i40e: Fix crash during removing i40e driver (git-fixes).
- i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (git-fixes).
- ibmveth: Fix use of ibmveth in a bridge (bsc#1174387 ltc#187506).
- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).
- ibmvnic fix NULL tx_pools and rx_tools issue at do_reset (bsc#1175873 ltc#187922).
- include/linux/poison.h: remove obsolete comment (git fixes (poison)).
- Input: psmouse - add a newline when printing 'proto' by sysfs (git-fixes).
- Input: sentelic - fix error return when fsp_reg_write fails (bsc#1111666).
- integrity: remove redundant initialization of variable ret (git-fixes).
- ip6_gre: fix null-ptr-deref in ip6gre_init_net() (git-fixes).
- ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() (networking-stable-20_06_28).
- ip6_tunnel: allow not to count pkts on tstats by passing dev as NULL (bsc#1175515).
- ip_tunnel: allow not to count pkts on tstats by setting skb's dev to NULL (bsc#1175515).
- ip_tunnel: Emit events for post-register MTU changes (git-fixes).
- ip_tunnel: fix use-after-free in ip_tunnel_lookup() (networking-stable-20_06_28).
- ip_tunnel: restore binding to ifaces with a large mtu (git-fixes).
- ipv4: fill fl4_icmp_{type,code} in ping_v4_sendmsg (networking-stable-20_07_17).
- ipv4: Silence suspicious RCU usage warning (git-fixes).
- ipv6: fix memory leaks on IPV6_ADDRFORM path (git-fixes).
- ipvlan: fix device features (git-fixes).
- ipvs: allow connection reuse for unconfirmed conntrack (git-fixes).
- ipvs: fix refcount usage for conns in ops mode (git-fixes).
- ipvs: fix the connection sync failed in some cases (bsc#1174699).
- irqchip/gic: Atomically update affinity (bsc#1111666).
- iwlegacy: Check the return value of pcie_capability_read_*() (bsc#1111666).
- jbd2: add the missing unlock_buffer() in the error path of jbd2_write_superblock() (bsc#1175772).
- kABI: genetlink: remove genl_bind (kabi).
- kabi: hide new parameter of ip6_dst_lookup_flow() (bsc#1165629).
- kabi: mask changes to struct ipv6_stub (bsc#1165629).
- kernel/cpu_pm: Fix uninitted local in cpu_pm (git fixes (kernel/pm)).
- kernel/relay.c: fix memleak on destroy relay channel (git-fixes).
- kernfs: do not call fsnotify() with name without a parent (bsc#1175770).
- KVM: arm64: Ensure 'params' is initialised when looking up sys register (bsc#1133021).
- KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART (bsc#1133021).
- KVM: arm/arm64: Fix young bit from mmu notifier (bsc#1133021).
- KVM: arm/arm64: vgic: Do not rely on the wrong pending table (bsc#1133021).
- KVM: arm/arm64: vgic-its: Fix restoration of unmapped collections (bsc#1133021).
- KVM: arm: Fix DFSR setting for non-LPAE aarch32 guests (bsc#1133021).
- KVM: arm: Make inject_abt32() inject an external abort instead (bsc#1133021).
- kvm: Change offset in kvm_write_guest_offset_cached to unsigned (bsc#1133021).
- KVM: Check for a bad hva before dropping into the ghc slow path (bsc#1133021).
- KVM: PPC: Book3S PR: Remove uninitialized_var() usage (bsc#1065729).
- l2tp: remove skb_dst_set() from l2tp_xmit_skb() (networking-stable-20_07_17).
- leds: 88pm860x: fix use-after-free on unbind (git-fixes).
- leds: core: Flush scheduled work for system suspend (git-fixes).
- leds: da903x: fix use-after-free on unbind (git-fixes).
- leds: lm3533: fix use-after-free on unbind (git-fixes).
- leds: lm355x: avoid enum conversion warning (git-fixes).
- leds: wm831x-status: fix use-after-free on unbind (git-fixes).
- lib/dim: Fix -Wunused-const-variable warnings (bsc#1174852).
- lib: dimlib: fix help text typos (bsc#1174852).
- linux/dim: Add completions count to dim_sample (bsc#1174852).
- linux/dim: Fix overflow in dim calculation (bsc#1174852).
- linux/dim: Move implementation to .c files (bsc#1174852).
- linux/dim: Move logic to dim.h (bsc#1174852).
- linux/dim: Remove 'net' prefix from internal DIM members (bsc#1174852).
- linux/dim: Rename externally exposed macros (bsc#1174852).
- linux/dim: Rename externally used net_dim members (bsc#1174852).
- linux/dim: Rename net_dim_sample() to net_dim_update_sample() (bsc#1174852).
- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).
- llc: make sure applications use ARPHRD_ETHER (networking-stable-20_07_17).
- mac80211: mesh: Free ie data when leaving mesh (git-fixes).
- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).
- MAINTAINERS: add entry for Dynamic Interrupt Moderation (bsc#1174852).
- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (git-fixes).
- md/raid5: Fix Force reconstruct-write io stuck in degraded raid5 (git-fixes).
- media: budget-core: Improve exception handling in budget_register() (git-fixes).
- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).
- media: firewire: Using uninitialized values in node_probe() (git-fixes).
- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).
- media: vpss: clean up resources in init (git-fixes).
- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).
- mfd: dln2: Run event handler loop under spinlock (git-fixes).
- mfd: rk808: Fix RK818 ID template (bsc#1175412).
- mld: fix memory leak in ipv6_mc_destroy_dev() (networking-stable-20_06_28).
- mm: filemap: clear idle flag for writes (bsc#1175769).
- mm/migrate.c: add missing flush_dcache_page for non-mapped page migrate (git fixes (mm/migrate)).
- mm/mmu_notifier: use hlist_add_head_rcu() (git fixes (mm/mmu_notifiers)).
- mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() (git fixes (mm/compaction)).
- mm/rmap.c: do not reuse anon_vma if we just want a copy (git fixes (mm/rmap)).
- mm/shmem.c: cast the type of unmap_start to u64 (git fixes (mm/shmem)).
- mm, thp: fix defrag setting if newline is not used (git fixes (mm/thp)).
- mm/vunmap: add cond_resched() in vunmap_pmd_range (bsc#1175654 ltc#184617).
- mtd: spi-nor: Fix an error code in spi_nor_read_raw() (bsc#1175413).
- mtd: spi-nor: fix kernel-doc for spi_nor::info (bsc#1175414).
- mtd: spi-nor: fix kernel-doc for spi_nor::reg_proto (bsc#1175415).
- mtd: spi-nor: fix silent truncation in spi_nor_read_raw() (bsc#1175416).
- mwifiex: Prevent memory corruption handling keys (git-fixes).
- net: Added pointer check for dst->ops->neigh_lookup in dst_neigh_lookup_skb (git-fixes).
- net: bridge: enfore alignment for ethernet address (networking-stable-20_06_28).
- net: core: reduce recursion limit value (networking-stable-20_06_28).
- net: Do not clear the sock TX queue in sk_set_socket() (networking-stable-20_06_28).
- net: dsa: b53: check for timeout (git-fixes).
- net: ena: Add first_interrupt field to napi struct (bsc#1174852).
- net: ena: add reserved PCI device ID (bsc#1174852).
- net: ena: add support for reporting of packet drops (bsc#1174852).
- net: ena: add support for the rx offset feature (bsc#1174852).
- net: ena: add support for traffic mirroring (bsc#1174852).
- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).
- net: ena: allow setting the hash function without changing the key (bsc#1174852).
- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).
- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).
- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).
- net: ena: change num_queues to num_io_queues for clarity and consistency (bsc#1174852).
- net: ena: changes to RSS hash key allocation (bsc#1174852).
- net: ena: Change WARN_ON expression in ena_del_napi_in_range() (bsc#1174852).
- net: ena: clean up indentation issue (bsc#1174852).
- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).
- net: ena: cosmetic: code reorderings (bsc#1174852).
- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).
- net: ena: cosmetic: fix line break issues (bsc#1174852).
- net: ena: cosmetic: fix spacing issues (bsc#1174852).
- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).
- net: ena: cosmetic: minor code changes (bsc#1174852).
- net: ena: cosmetic: remove unnecessary code (bsc#1174852).
- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).
- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).
- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).
- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).
- net: ena: drop superfluous prototype (bsc#1174852).
- net: ena: enable support of rss hash key and function changes (bsc#1174852).
- net: ena: enable the interrupt_moderation in driver_supported_features (bsc#1174852).
- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).
- net: ena: ethtool: get_channels: use combined only (bsc#1174852).
- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).
- net: ena: ethtool: support set_channels callback (bsc#1174852).
- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).
- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).
- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).
- net: ena: fix incorrect setting of the number of msix vectors (bsc#1174852).
- net: ena: fix incorrect update of intr_delay_resolution (bsc#1174852).
- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).
- net: ena: fix update of interrupt moderation register (bsc#1174852).
- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).
- net: ena: implement XDP drop support (bsc#1174852).
- net: ena: Implement XDP_TX action (bsc#1174852).
- net: ena: make ethtool -l show correct max number of queues (bsc#1174852).
- net: ena: Make missed_tx stat incremental (bsc#1083548).
- net: ena: Make some functions static (bsc#1174852).
- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).
- net: ena: multiple queue creation related cleanups (bsc#1174852).
- net: ena: Prevent reset after device destruction (bsc#1083548).
- net: ena: reduce driver load time (bsc#1174852).
- net: ena: remove all old adaptive rx interrupt moderation code from ena_com (bsc#1174852).
- net: ena: remove code duplication in ena_com_update_nonadaptive_moderation_interval _*() (bsc#1174852).
- net: ena: remove code that does nothing (bsc#1174852).
- net: ena: remove ena_restore_ethtool_params() and relevant fields (bsc#1174852).
- net: ena: remove old adaptive interrupt moderation code from ena_netdev (bsc#1174852).
- net: ena: remove redundant print of number of queues (bsc#1174852).
- net: ena: remove set but not used variable 'hash_key' (bsc#1174852).
- net: ena: remove set but not used variable 'rx_ring' (bsc#1174852).
- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).
- net: ena: Select DIMLIB for ENA_ETHERNET (bsc#1174852).
- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).
- net: ena: support new LLQ acceleration mode (bsc#1174852).
- net: ena: switch to dim algorithm for rx adaptive interrupt moderation (bsc#1174852).
- net: ena: use explicit variable size for clarity (bsc#1174852).
- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).
- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1174852).
- net: ena: xdp: XDP_TX: fix memory leak (bsc#1174852).
- net: ethernet: aquantia: Fix wrong return value (git-fixes).
- net: ethernet: broadcom: have drivers select DIMLIB as needed (bsc#1174852).
- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).
- net: fec: correct the error path for regulator disable in probe (git-fixes).
- netfilter: x_tables: add counters allocation wrapper (git-fixes).
- netfilter: x_tables: cap allocations at 512 mbyte (git-fixes).
- netfilter: x_tables: limit allocation requests for blob rule heads (git-fixes).
- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)
- net: fix memleak in register_netdevice() (networking-stable-20_06_28).
- net: Fix the arp error in some cases (networking-stable-20_06_28).
- net: gre: recompute gre csum for sctp over gre tunnels (git-fixes).
- net: increment xmit_recursion level in dev_direct_xmit() (networking-stable-20_06_28).
- net: ip6_gre: Request headroom in __gre6_xmit() (git-fixes).
- net: lan78xx: add missing endpoint sanity check (git-fixes).
- net: lan78xx: fix transfer-buffer memory leak (git-fixes).
- net: make symbol 'flush_works' static (git-fixes).
- net/mlx5: Delete extra dump stack that gives nothing (git-fixes).
- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).
- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).
- net: netsec: Fix signedness bug in netsec_probe() (bsc#1175417).
- net: netsec: initialize tx ring on ndo_open (bsc#1175418).
- net: phy: Check harder for errors in get_phy_id() (bsc#1111666).
- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).
- net: Set fput_needed iff FDPUT_FPUT is set (git-fixes).
- net: socionext: Fix a signedness bug in ave_probe() (bsc#1175419).
- net: socionext: replace napi_alloc_frag with the netdev variant on init (bsc#1175420).
- net: spider_net: Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- net: stmmac: dwmac1000: provide multicast filter fallback (git-fixes).
- net: stmmac: Fix RX packet size > 8191 (git-fixes).
- net: udp: Fix wrong clean up for IS_UDPLITE macro (git-fixes).
- net: update net_dim documentation after rename (bsc#1174852).
- net: usb: ax88179_178a: fix packet alignment padding (networking-stable-20_06_28).
- net: usb: qmi_wwan: add support for Quectel EG95 LTE modem (networking-stable-20_07_17).
- netvsc: unshare skb in VF rx handler (git-fixes).
- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).
- NTB: Fix an error in get link status (git-fixes).
- ntb_netdev: fix sleep time mismatch (git-fixes).
- NTB: ntb_transport: Use scnprintf() for avoiding potential buffer overflow (git-fixes).
- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).
- nvme: fix possible deadlock when I/O is blocked (git-fixes).
- nvme-multipath: do not fall back to __nvme_find_path() for non-optimized paths (bsc#1172108).
- nvme-multipath: fix logic for non-optimized paths (bsc#1172108).
- nvme-multipath: round-robin: eliminate 'fallback' variable (bsc#1172108).
- nvme: multipath: round-robin: fix single non-optimized path case (bsc#1172108).
- obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).
- ocfs2: add trimfs dlm lock resource (bsc#1175228).
- ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: change slot number type s16 to u16 (bsc#1175786).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: fix remounting needed after setfacl command (bsc#1173954).
- ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).
- ocfs2: fix value of OCFS2_INVALID_SLOT (bsc#1175767).
- ocfs2: load global_inode_alloc (bsc#1172963).
- omapfb: dss: Fix max fclk divider for omap36xx (bsc#1113956)
- openvswitch: Prevent kernel-infoleak in ovs_ct_put_key() (git-fixes).
- PCI/ASPM: Add missing newline in sysfs 'policy' (git-fixes).
- PCI: dwc: Move interrupt acking into the proper callback (bsc#1175666).
- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).
- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).
- PCI: hv: Fix a timing issue which causes kdump to fail occasionally (bsc#1172871, bsc#1172872, git-fixes).
- PCI: Release IVRS table in AMD ACS quirk (git-fixes).
- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).
- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).
- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).
- pinctrl: single: fix function name in documentation (git-fixes).
- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).
- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).
- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).
- PM / CPU: replace raw_notifier with atomic_notifier (git fixes (kernel/pm)).
- PM / devfreq: rk3399_dmc: Add missing of_node_put() (bsc#1175668).
- PM / devfreq: rk3399_dmc: Disable devfreq-event device when fails.
- PM / devfreq: rk3399_dmc: Fix kernel oops when rockchip,pmu is absent (bsc#1175668).
- PM: sleep: core: Fix the handling of pending runtime resume requests (git-fixes).
- powerpc/64s: Do not init FSCR_DSCR in __init_FSCR() (bsc#1065729).
- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).
- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).
- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).
- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).
- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).
- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).
- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).
- powerpc/perf: Fix missing is_sier_aviable() during build (bsc#1065729).
- powerpc/pseries: Do not initiate shutdown when system is running on UPS (bsc#1175440 ltc#187574).
- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).
- powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU death (bsc#1085030 ltC#165630).
- powerpc/pseries: PCIE PHB reset (bsc#1174689).
- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).
- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).
- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).
- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).
- pseries: Fix 64 bit logical memory block panic (bsc#1065729).
- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).
- rds: Prevent kernel-infoleak in rds_notify_queue_get() (git-fixes).
- regulator: gpio: Honor regulator-boot-on property (git-fixes).
- Revert 'ALSA: hda: call runtime_allow() for all hda controllers' (bsc#1111666).
- Revert 'drm/amdgpu: Fix NULL dereference in dpm sysfs handlers' (bsc#1113956) * refresh for context changes
- Revert 'ocfs2: avoid inode removal while nfsd is accessing it' This reverts commit 9e096c72476eda333a9998ff464580c00ff59c83.
- Revert 'ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).' This reverts commit 0bf6e248f93736b3f17f399b4a8f64ffa30d371e.
- Revert 'ocfs2: load global_inode_alloc (bsc#1172963).' This reverts commit fc476497b53f967dc615b9cbad9427ba3107b5c4.
- Revert 'scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe' (bsc#1171688 bsc#1174003).
- Revert 'scsi: qla2xxx: Fix crash on qla2x00_mailbox_command' (bsc#1171688 bsc#1174003).
- Revert 'xen/balloon: Fix crash when ballooning on x86 32 bit PAE' (bsc#1065600).
- rocker: fix incorrect error handling in dma_rings_init (networking-stable-20_06_28).
- rpm/check-for-config-changes: Ignore CONFIG_CC_VERSION_TEXT
- rpm/check-for-config-changes: Ignore CONFIG_LD_VERSION
- rpm/kernel-source.spec.in: Add obsolete_rebuilds (boo#1172073).
- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).
- s390, dcssblk: kaddr and pfn can be NULL to ->direct_access() (bsc#1174873).
- sched: consistently handle layer3 header accesses in the presence of VLANs (networking-stable-20_07_17).
- scsi: dh: Add Fujitsu device to devinfo and dh lists (bsc#1174026).
- scsi: Fix trivial spelling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Address a set of sparse warnings (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change {RD,WRT}_REG_*() function names from upper case into lower case (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in header files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in source files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix issue with adapter's stopping state (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix login timeout (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix null pointer access during disconnect from subsystem (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix spelling of a variable name (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix warning after FC target reset (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush all sessions on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush I/O on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Initialize 'n' before using it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce noisy debug message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove an unused function (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove a superfluous cast (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: SAN congestion management implementation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use register names instead of register offsets (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for ha->fw_dumped (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1171688 bsc#1174003).
- scsi: smartpqi: add bay identifier (bsc#1172418).
- scsi: smartpqi: add gigabyte controller (bsc#1172418).
- scsi: smartpqi: add id support for SmartRAID 3152-8i (bsc#1172418).
- scsi: smartpqi: add inquiry timeouts (bsc#1172418).
- scsi: smartpqi: add module param for exposure order (bsc#1172418).
- scsi: smartpqi: add module param to hide vsep (bsc#1172418).
- scsi: smartpqi: add new pci ids (bsc#1172418).
- scsi: smartpqi: add pci ids for fiberhome controller (bsc#1172418).
- scsi: smartpqi: add RAID bypass counter (bsc#1172418).
- scsi: smartpqi: add sysfs entries (bsc#1172418).
- scsi: smartpqi: Align driver syntax with oob (bsc#1172418).
- scsi: smartpqi: avoid crashing kernel for controller issues (bsc#1172418).
- scsi: smartpqi: bump version (bsc#1172418).
- scsi: smartpqi: bump version (bsc#1172418).
- scsi: smartpqi: bump version to 1.2.16-010 (bsc#1172418).
- scsi: smartpqi: change TMF timeout from 60 to 30 seconds (bsc#1172418).
- scsi: smartpqi: correct hang when deleting 32 lds (bsc#1172418).
- scsi: smartpqi: correct REGNEWD return status (bsc#1172418).
- scsi: smartpqi: correct syntax issue (bsc#1172418).
- scsi: smartpqi: fix call trace in device discovery (bsc#1172418).
- scsi: smartpqi: fix controller lockup observed during force reboot (bsc#1172418).
- scsi: smartpqi: fix LUN reset when fw bkgnd thread is hung (bsc#1172418).
- scsi: smartpqi: fix problem with unique ID for physical device (bsc#1172418).
- scsi: smartpqi: identify physical devices without issuing INQUIRY (bsc#1172418).
- scsi: smartpqi: properly set both the DMA mask and the coherent DMA mask (bsc#1172418).
- scsi: smartpqi: remove unused manifest constants (bsc#1172418).
- scsi: smartpqi: Reporting unhandled SCSI errors (bsc#1172418).
- scsi: smartpqi: support device deletion via sysfs (bsc#1172418).
- scsi: smartpqi: update copyright (bsc#1172418).
- scsi: smartpqi: update logical volume size after expansion (bsc#1172418).
- scsi: smartpqi: Use scnprintf() for avoiding potential buffer overflow (bsc#1172418).
- scsi: storvsc: Correctly set number of hardware queues for IDE disk (git-fixes).
- scsi: target/iblock: fix WRITE SAME zeroing (bsc#1169790).
- sctp: Do not advertise IPv4 addresses if ipv6only is set on the socket (networking-stable-20_06_28).
- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).
- serial: 8250: change lock order in serial8250_do_startup() (git-fixes).
- serial: pl011: Do not leak amba_ports entry on driver register error (git-fixes).
- serial: pl011: Fix oops on -EPROBE_DEFER (git-fixes).
- Set VIRTIO_CONSOLE=y (bsc#1175667).
- sign also s390x kernel images (bsc#1163524)
- soc: fsl: qbman: allow registering a device link for the portal user (bsc#1174550).
- soc: fsl: qbman_portals: add APIs to retrieve the probing status (bsc#1174550).
- spi: davinci: Remove uninitialized_var() usage (git-fixes).
- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).
- spi: nxp-fspi: Ensure width is respected in spi-mem operations (bsc#1175421).
- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1175422).
- spi: spi-mem: export spi_mem_default_supports_op() (bsc#1175421).
- spi: sun4i: update max transfer size reported (git-fixes).
- staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).
- staging: fsl-dpaa2: ethsw: Add missing netdevice check (bsc#1175423).
- staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).
- Staging: rtl8723bs: prevent buffer overflow in update_sta_support_rate() (git-fixes).
- staging/speakup: fix get_word non-space look-ahead (git-fixes).
- tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT (networking-stable-20_06_28).
- tcp: grow window for OOO packets only for SACK flows (networking-stable-20_06_28).
- tcp: make sure listeners do not initialize congestion-control state (networking-stable-20_07_17).
- tcp: md5: add missing memory barriers in tcp_md5_do_add()/tcp_md5_hash_key() (networking-stable-20_07_17).
- tcp: md5: do not send silly options in SYNCOOKIES (networking-stable-20_07_17).
- tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key() barriers (networking-stable-20_07_17).
- tracepoint: Mark __tracepoint_string's __used (git-fixes).
- tracing: Use trace_sched_process_free() instead of exit() for pid tracing (git-fixes).
- tty: serial: fsl_lpuart: add imx8qxp support (bsc#1175670).
- tty: serial: fsl_lpuart: free IDs allocated by IDA (bsc#1175670).
- Update patch reference for a tipc fix patch (bsc#1175515)
- USB: cdc-acm: rework notification_buffer resizing (git-fixes).
- usb: gadget: f_tcm: Fix some resource leaks in some error paths (git-fixes).
- usb: host: ohci-exynos: Fix error handling in exynos_ohci_probe() (git-fixes).
- USB: Ignore UAS for JMicron JMS567 ATA/ATAPI Bridge (git-fixes).
- USB: iowarrior: fix up report size handling for some devices (git-fixes).
- usbip: tools: fix module name in man page (git-fixes).
- USB: rename USB quirk to USB_QUIRK_ENDPOINT_IGNORE (git-fixes).
- USB: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).
- USB: serial: cp210x: re-enable auto-RTS on open (git-fixes).
- USB: serial: ftdi_sio: clean up receive processing (git-fixes).
- USB: serial: ftdi_sio: fix break and sysrq handling (git-fixes).
- USB: serial: ftdi_sio: make process-packet buffer unsigned (git-fixes).
- USB: serial: iuu_phoenix: fix led-activity helpers (git-fixes).
- USB: serial: qcserial: add EM7305 QDL product ID (git-fixes).
- usb: xhci: define IDs for various ASMedia host controllers (git-fixes).
- usb: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).
- usb: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).
- usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).
- VFS: Check rename_lock in lookup_fast() (bsc#1174734).
- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).
- video: pxafb: Fix the function used to balance a 'dma_alloc_coherent()' call (git-fixes).
- vlan: consolidate VLAN parsing code and limit max parsing depth (networking-stable-20_07_17).
- vmxnet3: use correct tcp hdr length when packet is encapsulated (bsc#1175199).
- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (bsc#1111666).
- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (bsc#1111666).
- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (bsc#1111666).
- wl1251: fix always return 0 error (git-fixes).
- x86/hyperv: Create and use Hyper-V page definitions (git-fixes).
- x86/hyper-v: Fix overflow bug in fill_gva_list() (git-fixes).
- x86/hyperv: Make hv_vcpu_is_preempted() visible (git-fixes).
- xen/balloon: fix accounting in alloc_xenballooned_pages error path (bsc#1065600).
- xen/balloon: make the balloon wait interruptible (bsc#1065600).
- xfrm: check id proto in validate_tmpl() (git-fixes).
- xfrm: clean up xfrm protocol checks (git-fixes).
- xfrm_user: uncoditionally validate esn replay attribute struct (git-fixes).
- xfs: fix inode allocation block res calculation precedence (git-fixes).
- xfs: fix reflink quota reservation accounting error (git-fixes).
Patchnames
openSUSE-2020-1325
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-3639: Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may have allowed unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bnc#1085308 bnc#1087082 bnc#1172782 bnc#1172783). Mitigations for Arm had not been included yet.\n- CVE-2020-14314: Fixed potential negative array index in do_split() (bsc#1173798).\n- CVE-2020-14331: Fixed a buffer over write in vgacon_scroll (bnc#1174205).\n- CVE-2020-14356: A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system (bnc#1175213).\n- CVE-2020-1749: Some ipv6 protocols were not encrypted over ipsec tunnels (bsc#1165629).\n- CVE-2020-24394: fs/nfsd/vfs.c (in the NFS server) could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered (bnc#1175518).\n\nThe following non-security bugs were fixed:\n\n- ACPI: kABI fixes for subsys exports (bsc#1174968).\n- ACPI / LPSS: Resume BYT/CHT I2C controllers from resume_noirq (bsc#1174968).\n- ACPI / LPSS: Use acpi_lpss_* instead of acpi_subsys_* functions for hibernate (bsc#1174968).\n- ACPI: PM: Introduce \u0027poweroff\u0027 callbacks for ACPI PM domain and LPSS (bsc#1174968).\n- ACPI: PM: Simplify and fix PM domain hibernation callbacks (bsc#1174968).\n- af_key: pfkey_dump needs parameter validation (git-fixes).\n- agp/intel: Fix a memory leak on module initialisation failure (git-fixes).\n- ALSA: core: pcm_iec958: fix kernel-doc (bsc#1111666).\n- ALSA: echoaduio: Drop superfluous volatile modifier (bsc#1111666).\n- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (bsc#1111666).\n- ALSA: hda: Add support for Loongson 7A1000 controller (bsc#1111666).\n- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (bsc#1111666).\n- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (bsc#1111666).\n- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (bsc#1111666).\n- ALSA: hda: fix snd_hda_codec_cleanup() documentation (bsc#1111666).\n- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (bsc#1111666).\n- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (bsc#1111666).\n- ALSA: hda/realtek: Add model alc298-samsung-headphone (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex Book (git-fixes).\n- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (bsc#1111666).\n- ALSA: hda/realtek - Fix unused variable warning (bsc#1111666).\n- ALSA: hda - reverse the setting value in the micmute_led_set (bsc#1111666).\n- ALSA: pci: delete repeated words in comments (bsc#1111666).\n- ALSA: seq: oss: Serialize ioctls (bsc#1111666).\n- ALSA: usb-audio: Add capture support for Saffire 6 (USB 1.1) (git-fixes).\n- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (bsc#1111666).\n- ALSA: usb-audio: add startech usb audio dock name (bsc#1111666).\n- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (bsc#1111666).\n- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (bsc#1111666).\n- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (bsc#1111666).\n- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (bsc#1111666).\n- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).\n- ALSA: usb-audio: fix spelling mistake \u0027buss\u0027 -\u003e \u0027bus\u0027 (bsc#1111666).\n- ALSA: usb-audio: ignore broken processing/extension unit (git-fixes).\n- ALSA: usb-audio: Update documentation comment for MS2109 quirk (git-fixes).\n- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (bsc#1111666).\n- ALSA: usb/line6: remove \u0027defined but not used\u0027 warning (bsc#1111666).\n- arm64: Add MIDR encoding for HiSilicon Taishan CPUs (bsc#1174547).\n- arm64: Add MIDR encoding for NVIDIA CPUs (bsc#1174547).\n- arm64: add sysfs vulnerability show for meltdown (bsc#1174547).\n- arm64: Add sysfs vulnerability show for spectre-v1 (bsc#1174547).\n- arm64: add sysfs vulnerability show for spectre-v2 (bsc#1174547).\n- arm64: add sysfs vulnerability show for speculative store bypass (bsc#1174547).\n- arm64: Advertise mitigation of Spectre-v2, or lack thereof (bsc#1174547)\n- arm64: Always enable spectre-v2 vulnerability detection (bsc#1174547).\n- arm64: Always enable ssb vulnerability detection (bsc#1174547).\n- arm64: backtrace: Do not bother trying to unwind the userspace stack (bsc#1175397).\n- arm64: capabilities: Add NVIDIA Denver CPU to bp_harden list (bsc#1174547).\n- arm64: capabilities: Merge duplicate Cavium erratum entries (bsc#1174547).\n- arm64: capabilities: Merge entries for ARM64_WORKAROUND_CLEAN_CACHE (bsc#1174547).\n- arm64: cpufeature: Enable Qualcomm Falkor/Kryo errata 1003 (bsc#1175398).\n- arm64: Do not mask out PTE_RDONLY in pte_same() (bsc#1175393).\n- arm64: enable generic CPU vulnerabilites support (bsc#1174547). Update config/arm64/default\n- arm64: Ensure VM_WRITE|VM_SHARED ptes are clean by default (bsc#1175394).\n- arm64: errata: Do not define type field twice for arm64_errata entries (bsc#1174547).\n- arm64: errata: Update stale comment (bsc#1174547).\n- arm64: Get rid of __smccc_workaround_1_hvc_* (bsc#1174547).\n- arm64: kpti: Avoid rewriting early page tables when KASLR is enabled (bsc#1174547).\n- arm64: kpti: Update arm64_kernel_use_ng_mappings() when forced on (bsc#1174547).\n- arm64: kpti: Whitelist Cortex-A CPUs that do not implement the CSV3 field (bsc#1174547).\n- arm64: kpti: Whitelist HiSilicon Taishan v110 CPUs (bsc#1174547).\n- arm64: KVM: Avoid setting the upper 32 bits of VTCR_EL2 to 1 (bsc#1133021).\n- arm64: KVM: Guests can skip __install_bp_hardening_cb()s HYP work (bsc#1174547).\n- arm64: KVM: Use SMCCC_ARCH_WORKAROUND_1 for Falkor BP hardening (bsc#1174547).\n- arm64: mm: Fix pte_mkclean, pte_mkdirty semantics (bsc#1175526).\n- arm64: Provide a command line to disable spectre_v2 mitigation (bsc#1174547).\n- arm64: Silence clang warning on mismatched value/register sizes (bsc#1175396).\n- arm64/speculation: Support \u0027mitigations=\u0027 cmdline option (bsc#1174547).\n- arm64: ssbd: explicitly depend on \u0026lt;linux/prctl.h\u003e (bsc#1175399).\n- arm64: ssbs: Do not treat CPUs with SSBS as unaffected by SSB (bsc#1174547).\n- arm64: ssbs: Fix context-switch when SSBS is present on all CPUs (bsc#1175669).\n- arm64/sve: \u0026lt;uapi/asm/ptrace.h\u003e should not depend on \u0026lt;uapi/linux/prctl.h\u003e (bsc#1175401).\n- arm64/sve: Fix wrong free for task-\u003ethread.sve_state (bsc#1175400).\n- arm64: tlbflush: avoid writing RES0 bits (bsc#1175402).\n- arm64: Use firmware to detect CPUs that are not affected by Spectre-v2 (bsc#1174547).\n- ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17 (bsc#1133021).\n- ARM: KVM: invalidate icache on guest exit for Cortex-A15 (bsc#1133021).\n- ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15 (bsc#1133021).\n- ASoC: hda/tegra: Set buffer alignment to 128 bytes (bsc#1111666).\n- ASoC: intel: Fix memleak in sst_media_open (git-fixes).\n- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).\n- AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).\n- AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).\n- AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).\n- ax88172a: fix ax88172a_unbind() failures (git-fixes).\n- b43: Remove uninitialized_var() usage (git-fixes).\n- bcache: allocate meta data pages as compound pages (bsc#1172873).\n- block: check queue\u0027s limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).\n- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).\n- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (bsc#1111666).\n- Bluetooth: Fix update of connection state in `hci_encrypt_cfm` (git-fixes).\n- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (bsc#1111666).\n- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (bsc#1111666).\n- bonding: fix active-backup failover for current ARP slave (bsc#1174771).\n- bonding: fix a potential double-unregister (git-fixes).\n- bonding: show saner speed for broadcast mode (git-fixes).\n- bpf: Fix map leak in HASH_OF_MAPS map (git-fixes).\n- brcmfmac: keep SDIO watchdog running when console_interval is non-zero (bsc#1111666).\n- brcmfmac: set state of hanger slot to FREE when flushing PSQ (bsc#1111666).\n- brcmfmac: To fix Bss Info flag definition Bug (bsc#1111666).\n- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).\n- btrfs: fix block group leak when removing fails (bsc#1175149).\n- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).\n- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).\n- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).\n- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).\n- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).\n- btrfs: fix memory leaks after failure to lookup checksums during inode logging (bsc#1175550).\n- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).\n- btrfs: fix race between block group removal and block group creation (bsc#1175149).\n- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).\n- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).\n- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).\n- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).\n- btrfs: Open code btrfs_write_and_wait_marked_extents (bsc#1175149).\n- btrfs: Rename and export clear_btree_io_tree (bsc#1175149).\n- btrfs: treat RWF_{,D}SYNC writes as sync for CRCs (bsc#1175493).\n- cfg80211: check vendor command doit pointer before use (git-fixes).\n- char: virtio: Select VIRTIO from VIRTIO_CONSOLE (bsc#1175667).\n- cifs: document and cleanup dfs mount (bsc#1144333 bsc#1172428).\n- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1144333 bsc#1172428).\n- cifs: fix double free error on share and prefix (bsc#1144333 bsc#1172428).\n- cifs: handle empty list of targets in cifs_reconnect() (bsc#1144333 bsc#1172428).\n- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1144333 bsc#1172428).\n- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1144333 bsc#1172428).\n- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1144333 bsc#1172428).\n- cifs: reduce number of referral requests in DFS link lookups (bsc#1144333 bsc#1172428).\n- cifs: rename reconn_inval_dfs_target() (bsc#1144333 bsc#1172428).\n- clk: at91: clk-generated: check best_rate against ranges (bsc#1111666).\n- clk: clk-atlas6: fix return value check in atlas6_clk_init() (bsc#1111666).\n- clk: iproc: round clock rate to the closest (bsc#1111666).\n- clk: spear: Remove uninitialized_var() usage (git-fixes).\n- clk: st: Remove uninitialized_var() usage (git-fixes).\n- console: newport_con: fix an issue about leak related system resources (git-fixes).\n- crypto: ccp - Fix use of merged scatterlists (git-fixes).\n- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).\n- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).\n- dev: Defer free of skbs in flush_backlog (git-fixes).\n- device property: Fix the secondary firmware node handling in set_primary_fwnode() (git-fixes).\n- devres: keep both device name and resource name in pretty name (git-fixes).\n- dlm: Fix kobject memleak (bsc#1175768).\n- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).\n- Documentation/networking: Add net DIM documentation (bsc#1174852).\n- dpaa2-eth: Fix passing zero to \u0027PTR_ERR\u0027 warning (bsc#1175403).\n- dpaa2-eth: free already allocated channels on probe defer (bsc#1175404).\n- dpaa2-eth: prevent array underflow in update_cls_rule() (bsc#1175405).\n- dpaa_eth: add dropped frames to percpu ethtool stats (bsc#1174550).\n- dpaa_eth: add newline in dev_err() msg (bsc#1174550).\n- dpaa_eth: avoid timestamp read on error paths (bsc#1175406).\n- dpaa_eth: change DMA device (bsc#1174550).\n- dpaa_eth: cleanup skb_to_contig_fd() (bsc#1174550).\n- dpaa_eth: defer probing after qbman (bsc#1174550).\n- dpaa_eth: extend delays in ndo_stop (bsc#1174550).\n- dpaa_eth: fix DMA mapping leak (bsc#1174550).\n- dpaa_eth: Fix one possible memleak in dpaa_eth_probe (bsc#1174550).\n- dpaa_eth: FMan erratum A050385 workaround (bsc#1174550).\n- dpaa_eth: perform DMA unmapping before read (bsc#1175407).\n- dpaa_eth: register a device link for the qman portal used (bsc#1174550).\n- dpaa_eth: remove netdev_err() for user errors (bsc#1174550).\n- dpaa_eth: remove redundant code (bsc#1174550).\n- dpaa_eth: simplify variables used in dpaa_cleanup_tx_fd() (bsc#1174550).\n- dpaa_eth: use a page to store the SGT (bsc#1174550).\n- dpaa_eth: use fd information in dpaa_cleanup_tx_fd() (bsc#1174550).\n- dpaa_eth: use only one buffer pool per interface (bsc#1174550).\n- dpaa_eth: use page backed rx buffers (bsc#1174550).\n- driver core: Avoid binding drivers to dead devices (git-fixes).\n- Drivers: hv: balloon: Remove dependencies on guest page size (git-fixes).\n- Drivers: hv: vmbus: Fix virt_to_hvpfn() for X86_PAE (git-fixes).\n- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127, bsc#1175128).\n- Drivers: hv: vmbus: Remove the undesired put_cpu_ptr() in hv_synic_cleanup() (git-fixes).\n- drivers/perf: hisi: Fix typo in events attribute array (bsc#1175408).\n- drivers/perf: hisi: Fixup one DDRC PMU register offset (bsc#1175410).\n- drivers/perf: hisi: Fix wrong value for all counters enable (bsc#1175409).\n- drm: Added orientation quirk for ASUS tablet model T103HAF (bsc#1111666).\n- drm/amd/display: fix pow() crashing when given base 0 (git-fixes).\n- drm/amdgpu: avoid dereferencing a NULL pointer (bsc#1111666).\n- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (bsc#1111666).\n- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (bsc#1113956)\n- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).\n- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1113956)\n- drm/arm: fix unintentional integer overflow on left shift (git-fixes).\n- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1113956)\n- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).\n- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1113956)\n- drm/debugfs: fix plain echo to connector \u0027force\u0027 attribute (bsc#1111666).\n- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).\n- drm/etnaviv: fix ref count leak via pm_runtime_get_sync (bsc#1111666).\n- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (bsc#1112178)\n- drm: hold gem reference until object is no longer accessed (bsc#1113956)\n- drm/imx: fix use after free (git-fixes).\n- drm/imx: imx-ldb: Disable both channels for split mode in enc-\u003edisable() (git-fixes).\n- drm/imx: tve: fix regulator_disable error path (git-fixes).\n- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).\n- drm/msm/adreno: fix updating ring fence (git-fixes).\n- drm/msm: ratelimit crtc event overflow error (bsc#1111666).\n- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).\n- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).\n- drm/nouveau: fix multiple instances of reference count leaks (bsc#1111666).\n- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).\n- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).\n- drm/radeon: disable AGP by default (bsc#1111666).\n- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).\n- drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync (bsc#1111666).\n- drm/rockchip: fix VOP_WIN_GET macro (bsc#1175411).\n- drm/tilcdc: fix leak \u0026 null ref in panel_connector_get_modes (bsc#1111666).\n- drm/ttm/nouveau: do not call tt destroy callback on alloc failure (bsc#1175232).\n- drm/vmwgfx: Fix two list_for_each loop exit tests (bsc#1111666).\n- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (bsc#1111666).\n- drm/xen-front: Fix misused IS_ERR_OR_NULL checks (bsc#1065600).\n- ext4: check journal inode extents more carefully (bsc#1173485).\n- ext4: do not allow overlapping system zones (bsc#1173485).\n- ext4: fix checking of directory entry validity for inline directories (bsc#1175771).\n- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).\n- fbdev: Detect integer underflow at \u0027struct fbcon_ops\u0027-\u003eclear_margins. (bsc#1112178) \n- firmware: google: check if size is valid when decoding VPD data (git-fixes).\n- firmware: google: increment VPD key_len properly (git-fixes).\n- fsl/fman: add API to get the device behind a fman port (bsc#1174550).\n- fsl/fman: check dereferencing null pointer (git-fixes).\n- fsl/fman: detect FMan erratum A050385 (bsc#1174550).\n- fsl/fman: do not touch liodn base regs reserved on non-PAMU SoCs (bsc#1174550).\n- fsl/fman: fix dereference null return value (git-fixes).\n- fsl/fman: fix eth hash table allocation (git-fixes).\n- fsl/fman: fix unreachable code (git-fixes).\n- fsl/fman: remove unused struct member (bsc#1174550).\n- fsl/fman: use 32-bit unsigned integer (git-fixes).\n- fuse: fix memleak in cuse_channel_open (bsc#1174926).\n- fuse: fix missing unlock_page in fuse_writepage() (bsc#1174904).\n- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175062).\n- fuse: fix weird page warning (bsc#1175063).\n- fuse: flush dirty data/metadata before non-truncate setattr (bsc#1175064).\n- fuse: truncate pending writes on O_TRUNC (bsc#1175065).\n- fuse: verify attributes (bsc#1175066).\n- fuse: verify nlink (bsc#1175067).\n- genetlink: remove genl_bind (networking-stable-20_07_17).\n- go7007: add sanity checking for endpoints (git-fixes).\n- gpu: host1x: debug: Fix multiple channels emitting messages simultaneously (bsc#1111666).\n- hv_balloon: Balloon up according to request page number (git-fixes).\n- hv_balloon: Use a static page for the balloon_up send buffer (git-fixes).\n- hv_netvsc: Allow scatter-gather feature to be tunable (git-fixes).\n- hv_netvsc: do not use VF device if link is down (git-fixes).\n- hv_netvsc: Fix a warning of suspicious RCU usage (git-fixes).\n- hv_netvsc: Fix error handling in netvsc_attach() (git-fixes).\n- hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (git-fixes).\n- hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (git-fixes).\n- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (git-fixes).\n- hv_netvsc: flag software created hash value (git-fixes).\n- hv_netvsc: Remove \u0027unlikely\u0027 from netvsc_select_queue (git-fixes).\n- i2c: rcar: in slave mode, clear NACK earlier (git-fixes).\n- i2c: rcar: slave: only send STOP event when we have been addressed (bsc#1111666).\n- i40e: Fix crash during removing i40e driver (git-fixes).\n- i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (git-fixes).\n- ibmveth: Fix use of ibmveth in a bridge (bsc#1174387 ltc#187506).\n- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).\n- ibmvnic fix NULL tx_pools and rx_tools issue at do_reset (bsc#1175873 ltc#187922).\n- include/linux/poison.h: remove obsolete comment (git fixes (poison)).\n- Input: psmouse - add a newline when printing \u0027proto\u0027 by sysfs (git-fixes).\n- Input: sentelic - fix error return when fsp_reg_write fails (bsc#1111666).\n- integrity: remove redundant initialization of variable ret (git-fixes).\n- ip6_gre: fix null-ptr-deref in ip6gre_init_net() (git-fixes).\n- ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() (networking-stable-20_06_28).\n- ip6_tunnel: allow not to count pkts on tstats by passing dev as NULL (bsc#1175515).\n- ip_tunnel: allow not to count pkts on tstats by setting skb\u0027s dev to NULL (bsc#1175515).\n- ip_tunnel: Emit events for post-register MTU changes (git-fixes).\n- ip_tunnel: fix use-after-free in ip_tunnel_lookup() (networking-stable-20_06_28).\n- ip_tunnel: restore binding to ifaces with a large mtu (git-fixes).\n- ipv4: fill fl4_icmp_{type,code} in ping_v4_sendmsg (networking-stable-20_07_17).\n- ipv4: Silence suspicious RCU usage warning (git-fixes).\n- ipv6: fix memory leaks on IPV6_ADDRFORM path (git-fixes).\n- ipvlan: fix device features (git-fixes).\n- ipvs: allow connection reuse for unconfirmed conntrack (git-fixes).\n- ipvs: fix refcount usage for conns in ops mode (git-fixes).\n- ipvs: fix the connection sync failed in some cases (bsc#1174699).\n- irqchip/gic: Atomically update affinity (bsc#1111666).\n- iwlegacy: Check the return value of pcie_capability_read_*() (bsc#1111666).\n- jbd2: add the missing unlock_buffer() in the error path of jbd2_write_superblock() (bsc#1175772).\n- kABI: genetlink: remove genl_bind (kabi).\n- kabi: hide new parameter of ip6_dst_lookup_flow() (bsc#1165629).\n- kabi: mask changes to struct ipv6_stub (bsc#1165629).\n- kernel/cpu_pm: Fix uninitted local in cpu_pm (git fixes (kernel/pm)).\n- kernel/relay.c: fix memleak on destroy relay channel (git-fixes).\n- kernfs: do not call fsnotify() with name without a parent (bsc#1175770).\n- KVM: arm64: Ensure \u0027params\u0027 is initialised when looking up sys register (bsc#1133021).\n- KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART (bsc#1133021).\n- KVM: arm/arm64: Fix young bit from mmu notifier (bsc#1133021).\n- KVM: arm/arm64: vgic: Do not rely on the wrong pending table (bsc#1133021).\n- KVM: arm/arm64: vgic-its: Fix restoration of unmapped collections (bsc#1133021).\n- KVM: arm: Fix DFSR setting for non-LPAE aarch32 guests (bsc#1133021).\n- KVM: arm: Make inject_abt32() inject an external abort instead (bsc#1133021).\n- kvm: Change offset in kvm_write_guest_offset_cached to unsigned (bsc#1133021).\n- KVM: Check for a bad hva before dropping into the ghc slow path (bsc#1133021).\n- KVM: PPC: Book3S PR: Remove uninitialized_var() usage (bsc#1065729).\n- l2tp: remove skb_dst_set() from l2tp_xmit_skb() (networking-stable-20_07_17).\n- leds: 88pm860x: fix use-after-free on unbind (git-fixes).\n- leds: core: Flush scheduled work for system suspend (git-fixes).\n- leds: da903x: fix use-after-free on unbind (git-fixes).\n- leds: lm3533: fix use-after-free on unbind (git-fixes).\n- leds: lm355x: avoid enum conversion warning (git-fixes).\n- leds: wm831x-status: fix use-after-free on unbind (git-fixes).\n- lib/dim: Fix -Wunused-const-variable warnings (bsc#1174852).\n- lib: dimlib: fix help text typos (bsc#1174852).\n- linux/dim: Add completions count to dim_sample (bsc#1174852).\n- linux/dim: Fix overflow in dim calculation (bsc#1174852).\n- linux/dim: Move implementation to .c files (bsc#1174852).\n- linux/dim: Move logic to dim.h (bsc#1174852).\n- linux/dim: Remove \u0027net\u0027 prefix from internal DIM members (bsc#1174852).\n- linux/dim: Rename externally exposed macros (bsc#1174852).\n- linux/dim: Rename externally used net_dim members (bsc#1174852).\n- linux/dim: Rename net_dim_sample() to net_dim_update_sample() (bsc#1174852).\n- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).\n- llc: make sure applications use ARPHRD_ETHER (networking-stable-20_07_17).\n- mac80211: mesh: Free ie data when leaving mesh (git-fixes).\n- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).\n- MAINTAINERS: add entry for Dynamic Interrupt Moderation (bsc#1174852).\n- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (git-fixes).\n- md/raid5: Fix Force reconstruct-write io stuck in degraded raid5 (git-fixes).\n- media: budget-core: Improve exception handling in budget_register() (git-fixes).\n- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).\n- media: firewire: Using uninitialized values in node_probe() (git-fixes).\n- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).\n- media: vpss: clean up resources in init (git-fixes).\n- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).\n- mfd: dln2: Run event handler loop under spinlock (git-fixes).\n- mfd: rk808: Fix RK818 ID template (bsc#1175412).\n- mld: fix memory leak in ipv6_mc_destroy_dev() (networking-stable-20_06_28).\n- mm: filemap: clear idle flag for writes (bsc#1175769).\n- mm/migrate.c: add missing flush_dcache_page for non-mapped page migrate (git fixes (mm/migrate)).\n- mm/mmu_notifier: use hlist_add_head_rcu() (git fixes (mm/mmu_notifiers)).\n- mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() (git fixes (mm/compaction)).\n- mm/rmap.c: do not reuse anon_vma if we just want a copy (git fixes (mm/rmap)).\n- mm/shmem.c: cast the type of unmap_start to u64 (git fixes (mm/shmem)).\n- mm, thp: fix defrag setting if newline is not used (git fixes (mm/thp)).\n- mm/vunmap: add cond_resched() in vunmap_pmd_range (bsc#1175654 ltc#184617).\n- mtd: spi-nor: Fix an error code in spi_nor_read_raw() (bsc#1175413).\n- mtd: spi-nor: fix kernel-doc for spi_nor::info (bsc#1175414).\n- mtd: spi-nor: fix kernel-doc for spi_nor::reg_proto (bsc#1175415).\n- mtd: spi-nor: fix silent truncation in spi_nor_read_raw() (bsc#1175416).\n- mwifiex: Prevent memory corruption handling keys (git-fixes).\n- net: Added pointer check for dst-\u003eops-\u003eneigh_lookup in dst_neigh_lookup_skb (git-fixes).\n- net: bridge: enfore alignment for ethernet address (networking-stable-20_06_28).\n- net: core: reduce recursion limit value (networking-stable-20_06_28).\n- net: Do not clear the sock TX queue in sk_set_socket() (networking-stable-20_06_28).\n- net: dsa: b53: check for timeout (git-fixes).\n- net: ena: Add first_interrupt field to napi struct (bsc#1174852).\n- net: ena: add reserved PCI device ID (bsc#1174852).\n- net: ena: add support for reporting of packet drops (bsc#1174852).\n- net: ena: add support for the rx offset feature (bsc#1174852).\n- net: ena: add support for traffic mirroring (bsc#1174852).\n- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).\n- net: ena: allow setting the hash function without changing the key (bsc#1174852).\n- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).\n- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).\n- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).\n- net: ena: change num_queues to num_io_queues for clarity and consistency (bsc#1174852).\n- net: ena: changes to RSS hash key allocation (bsc#1174852).\n- net: ena: Change WARN_ON expression in ena_del_napi_in_range() (bsc#1174852).\n- net: ena: clean up indentation issue (bsc#1174852).\n- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).\n- net: ena: cosmetic: code reorderings (bsc#1174852).\n- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).\n- net: ena: cosmetic: fix line break issues (bsc#1174852).\n- net: ena: cosmetic: fix spacing issues (bsc#1174852).\n- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).\n- net: ena: cosmetic: minor code changes (bsc#1174852).\n- net: ena: cosmetic: remove unnecessary code (bsc#1174852).\n- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).\n- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).\n- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).\n- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).\n- net: ena: drop superfluous prototype (bsc#1174852).\n- net: ena: enable support of rss hash key and function changes (bsc#1174852).\n- net: ena: enable the interrupt_moderation in driver_supported_features (bsc#1174852).\n- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).\n- net: ena: ethtool: get_channels: use combined only (bsc#1174852).\n- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).\n- net: ena: ethtool: support set_channels callback (bsc#1174852).\n- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).\n- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).\n- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).\n- net: ena: fix incorrect setting of the number of msix vectors (bsc#1174852).\n- net: ena: fix incorrect update of intr_delay_resolution (bsc#1174852).\n- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).\n- net: ena: fix update of interrupt moderation register (bsc#1174852).\n- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).\n- net: ena: implement XDP drop support (bsc#1174852).\n- net: ena: Implement XDP_TX action (bsc#1174852).\n- net: ena: make ethtool -l show correct max number of queues (bsc#1174852).\n- net: ena: Make missed_tx stat incremental (bsc#1083548).\n- net: ena: Make some functions static (bsc#1174852).\n- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).\n- net: ena: multiple queue creation related cleanups (bsc#1174852).\n- net: ena: Prevent reset after device destruction (bsc#1083548).\n- net: ena: reduce driver load time (bsc#1174852).\n- net: ena: remove all old adaptive rx interrupt moderation code from ena_com (bsc#1174852).\n- net: ena: remove code duplication in ena_com_update_nonadaptive_moderation_interval _*() (bsc#1174852).\n- net: ena: remove code that does nothing (bsc#1174852).\n- net: ena: remove ena_restore_ethtool_params() and relevant fields (bsc#1174852).\n- net: ena: remove old adaptive interrupt moderation code from ena_netdev (bsc#1174852).\n- net: ena: remove redundant print of number of queues (bsc#1174852).\n- net: ena: remove set but not used variable \u0027hash_key\u0027 (bsc#1174852).\n- net: ena: remove set but not used variable \u0027rx_ring\u0027 (bsc#1174852).\n- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).\n- net: ena: Select DIMLIB for ENA_ETHERNET (bsc#1174852).\n- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).\n- net: ena: support new LLQ acceleration mode (bsc#1174852).\n- net: ena: switch to dim algorithm for rx adaptive interrupt moderation (bsc#1174852).\n- net: ena: use explicit variable size for clarity (bsc#1174852).\n- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).\n- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1174852).\n- net: ena: xdp: XDP_TX: fix memory leak (bsc#1174852).\n- net: ethernet: aquantia: Fix wrong return value (git-fixes).\n- net: ethernet: broadcom: have drivers select DIMLIB as needed (bsc#1174852).\n- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).\n- net: fec: correct the error path for regulator disable in probe (git-fixes).\n- netfilter: x_tables: add counters allocation wrapper (git-fixes).\n- netfilter: x_tables: cap allocations at 512 mbyte (git-fixes).\n- netfilter: x_tables: limit allocation requests for blob rule heads (git-fixes).\n- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)\n- net: fix memleak in register_netdevice() (networking-stable-20_06_28).\n- net: Fix the arp error in some cases (networking-stable-20_06_28).\n- net: gre: recompute gre csum for sctp over gre tunnels (git-fixes).\n- net: increment xmit_recursion level in dev_direct_xmit() (networking-stable-20_06_28).\n- net: ip6_gre: Request headroom in __gre6_xmit() (git-fixes).\n- net: lan78xx: add missing endpoint sanity check (git-fixes).\n- net: lan78xx: fix transfer-buffer memory leak (git-fixes).\n- net: make symbol \u0027flush_works\u0027 static (git-fixes).\n- net/mlx5: Delete extra dump stack that gives nothing (git-fixes).\n- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).\n- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).\n- net: netsec: Fix signedness bug in netsec_probe() (bsc#1175417).\n- net: netsec: initialize tx ring on ndo_open (bsc#1175418).\n- net: phy: Check harder for errors in get_phy_id() (bsc#1111666).\n- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).\n- net: Set fput_needed iff FDPUT_FPUT is set (git-fixes).\n- net: socionext: Fix a signedness bug in ave_probe() (bsc#1175419).\n- net: socionext: replace napi_alloc_frag with the netdev variant on init (bsc#1175420).\n- net: spider_net: Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- net: stmmac: dwmac1000: provide multicast filter fallback (git-fixes).\n- net: stmmac: Fix RX packet size \u003e 8191 (git-fixes).\n- net: udp: Fix wrong clean up for IS_UDPLITE macro (git-fixes).\n- net: update net_dim documentation after rename (bsc#1174852).\n- net: usb: ax88179_178a: fix packet alignment padding (networking-stable-20_06_28).\n- net: usb: qmi_wwan: add support for Quectel EG95 LTE modem (networking-stable-20_07_17).\n- netvsc: unshare skb in VF rx handler (git-fixes).\n- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).\n- NTB: Fix an error in get link status (git-fixes).\n- ntb_netdev: fix sleep time mismatch (git-fixes).\n- NTB: ntb_transport: Use scnprintf() for avoiding potential buffer overflow (git-fixes).\n- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme-multipath: do not fall back to __nvme_find_path() for non-optimized paths (bsc#1172108).\n- nvme-multipath: fix logic for non-optimized paths (bsc#1172108).\n- nvme-multipath: round-robin: eliminate \u0027fallback\u0027 variable (bsc#1172108).\n- nvme: multipath: round-robin: fix single non-optimized path case (bsc#1172108).\n- obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).\n- ocfs2: add trimfs dlm lock resource (bsc#1175228).\n- ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).\n- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n- ocfs2: change slot number type s16 to u16 (bsc#1175786).\n- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n- ocfs2: fix remounting needed after setfacl command (bsc#1173954).\n- ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).\n- ocfs2: fix value of OCFS2_INVALID_SLOT (bsc#1175767).\n- ocfs2: load global_inode_alloc (bsc#1172963).\n- omapfb: dss: Fix max fclk divider for omap36xx (bsc#1113956)\n- openvswitch: Prevent kernel-infoleak in ovs_ct_put_key() (git-fixes).\n- PCI/ASPM: Add missing newline in sysfs \u0027policy\u0027 (git-fixes).\n- PCI: dwc: Move interrupt acking into the proper callback (bsc#1175666).\n- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).\n- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).\n- PCI: hv: Fix a timing issue which causes kdump to fail occasionally (bsc#1172871, bsc#1172872, git-fixes).\n- PCI: Release IVRS table in AMD ACS quirk (git-fixes).\n- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).\n- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).\n- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).\n- pinctrl: single: fix function name in documentation (git-fixes).\n- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).\n- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).\n- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).\n- PM / CPU: replace raw_notifier with atomic_notifier (git fixes (kernel/pm)).\n- PM / devfreq: rk3399_dmc: Add missing of_node_put() (bsc#1175668).\n- PM / devfreq: rk3399_dmc: Disable devfreq-event device when fails.\n- PM / devfreq: rk3399_dmc: Fix kernel oops when rockchip,pmu is absent (bsc#1175668).\n- PM: sleep: core: Fix the handling of pending runtime resume requests (git-fixes).\n- powerpc/64s: Do not init FSCR_DSCR in __init_FSCR() (bsc#1065729).\n- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).\n- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).\n- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).\n- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).\n- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).\n- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).\n- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).\n- powerpc/perf: Fix missing is_sier_aviable() during build (bsc#1065729).\n- powerpc/pseries: Do not initiate shutdown when system is running on UPS (bsc#1175440 ltc#187574).\n- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).\n- powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU death (bsc#1085030 ltC#165630).\n- powerpc/pseries: PCIE PHB reset (bsc#1174689).\n- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).\n- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).\n- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).\n- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).\n- pseries: Fix 64 bit logical memory block panic (bsc#1065729).\n- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).\n- rds: Prevent kernel-infoleak in rds_notify_queue_get() (git-fixes).\n- regulator: gpio: Honor regulator-boot-on property (git-fixes).\n- Revert \u0027ALSA: hda: call runtime_allow() for all hda controllers\u0027 (bsc#1111666).\n- Revert \u0027drm/amdgpu: Fix NULL dereference in dpm sysfs handlers\u0027 (bsc#1113956) \t* refresh for context changes\n- Revert \u0027ocfs2: avoid inode removal while nfsd is accessing it\u0027 This reverts commit 9e096c72476eda333a9998ff464580c00ff59c83.\n- Revert \u0027ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\u0027 This reverts commit 0bf6e248f93736b3f17f399b4a8f64ffa30d371e.\n- Revert \u0027ocfs2: load global_inode_alloc (bsc#1172963).\u0027 This reverts commit fc476497b53f967dc615b9cbad9427ba3107b5c4.\n- Revert \u0027scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe\u0027 (bsc#1171688 bsc#1174003).\n- Revert \u0027scsi: qla2xxx: Fix crash on qla2x00_mailbox_command\u0027 (bsc#1171688 bsc#1174003).\n- Revert \u0027xen/balloon: Fix crash when ballooning on x86 32 bit PAE\u0027 (bsc#1065600).\n- rocker: fix incorrect error handling in dma_rings_init (networking-stable-20_06_28).\n- rpm/check-for-config-changes: Ignore CONFIG_CC_VERSION_TEXT\n- rpm/check-for-config-changes: Ignore CONFIG_LD_VERSION\n- rpm/kernel-source.spec.in: Add obsolete_rebuilds (boo#1172073).\n- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).\n- s390, dcssblk: kaddr and pfn can be NULL to -\u003edirect_access() (bsc#1174873).\n- sched: consistently handle layer3 header accesses in the presence of VLANs (networking-stable-20_07_17).\n- scsi: dh: Add Fujitsu device to devinfo and dh lists (bsc#1174026).\n- scsi: Fix trivial spelling (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Address a set of sparse warnings (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Change {RD,WRT}_REG_*() function names from upper case into lower case (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix endianness annotations in header files (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix endianness annotations in source files (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix issue with adapter\u0027s stopping state (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix login timeout (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix null pointer access during disconnect from subsystem (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix spelling of a variable name (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix warning after FC target reset (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Flush all sessions on zone disable (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Flush I/O on zone disable (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Initialize \u0027n\u0027 before using it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Reduce noisy debug message (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove an unused function (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove a superfluous cast (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: SAN congestion management implementation (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use register names instead of register offsets (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use true, false for ha-\u003efw_dumped (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1171688 bsc#1174003).\n- scsi: smartpqi: add bay identifier (bsc#1172418).\n- scsi: smartpqi: add gigabyte controller (bsc#1172418).\n- scsi: smartpqi: add id support for SmartRAID 3152-8i (bsc#1172418).\n- scsi: smartpqi: add inquiry timeouts (bsc#1172418).\n- scsi: smartpqi: add module param for exposure order (bsc#1172418).\n- scsi: smartpqi: add module param to hide vsep (bsc#1172418).\n- scsi: smartpqi: add new pci ids (bsc#1172418).\n- scsi: smartpqi: add pci ids for fiberhome controller (bsc#1172418).\n- scsi: smartpqi: add RAID bypass counter (bsc#1172418).\n- scsi: smartpqi: add sysfs entries (bsc#1172418).\n- scsi: smartpqi: Align driver syntax with oob (bsc#1172418).\n- scsi: smartpqi: avoid crashing kernel for controller issues (bsc#1172418).\n- scsi: smartpqi: bump version (bsc#1172418).\n- scsi: smartpqi: bump version (bsc#1172418).\n- scsi: smartpqi: bump version to 1.2.16-010 (bsc#1172418).\n- scsi: smartpqi: change TMF timeout from 60 to 30 seconds (bsc#1172418).\n- scsi: smartpqi: correct hang when deleting 32 lds (bsc#1172418).\n- scsi: smartpqi: correct REGNEWD return status (bsc#1172418).\n- scsi: smartpqi: correct syntax issue (bsc#1172418).\n- scsi: smartpqi: fix call trace in device discovery (bsc#1172418).\n- scsi: smartpqi: fix controller lockup observed during force reboot (bsc#1172418).\n- scsi: smartpqi: fix LUN reset when fw bkgnd thread is hung (bsc#1172418).\n- scsi: smartpqi: fix problem with unique ID for physical device (bsc#1172418).\n- scsi: smartpqi: identify physical devices without issuing INQUIRY (bsc#1172418).\n- scsi: smartpqi: properly set both the DMA mask and the coherent DMA mask (bsc#1172418).\n- scsi: smartpqi: remove unused manifest constants (bsc#1172418).\n- scsi: smartpqi: Reporting unhandled SCSI errors (bsc#1172418).\n- scsi: smartpqi: support device deletion via sysfs (bsc#1172418).\n- scsi: smartpqi: update copyright (bsc#1172418).\n- scsi: smartpqi: update logical volume size after expansion (bsc#1172418).\n- scsi: smartpqi: Use scnprintf() for avoiding potential buffer overflow (bsc#1172418).\n- scsi: storvsc: Correctly set number of hardware queues for IDE disk (git-fixes).\n- scsi: target/iblock: fix WRITE SAME zeroing (bsc#1169790).\n- sctp: Do not advertise IPv4 addresses if ipv6only is set on the socket (networking-stable-20_06_28).\n- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).\n- serial: 8250: change lock order in serial8250_do_startup() (git-fixes).\n- serial: pl011: Do not leak amba_ports entry on driver register error (git-fixes).\n- serial: pl011: Fix oops on -EPROBE_DEFER (git-fixes).\n- Set VIRTIO_CONSOLE=y (bsc#1175667).\n- sign also s390x kernel images (bsc#1163524)\n- soc: fsl: qbman: allow registering a device link for the portal user (bsc#1174550).\n- soc: fsl: qbman_portals: add APIs to retrieve the probing status (bsc#1174550).\n- spi: davinci: Remove uninitialized_var() usage (git-fixes).\n- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).\n- spi: nxp-fspi: Ensure width is respected in spi-mem operations (bsc#1175421).\n- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1175422).\n- spi: spi-mem: export spi_mem_default_supports_op() (bsc#1175421).\n- spi: sun4i: update max transfer size reported (git-fixes).\n- staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).\n- staging: fsl-dpaa2: ethsw: Add missing netdevice check (bsc#1175423).\n- staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).\n- Staging: rtl8723bs: prevent buffer overflow in update_sta_support_rate() (git-fixes).\n- staging/speakup: fix get_word non-space look-ahead (git-fixes).\n- tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT (networking-stable-20_06_28).\n- tcp: grow window for OOO packets only for SACK flows (networking-stable-20_06_28).\n- tcp: make sure listeners do not initialize congestion-control state (networking-stable-20_07_17).\n- tcp: md5: add missing memory barriers in tcp_md5_do_add()/tcp_md5_hash_key() (networking-stable-20_07_17).\n- tcp: md5: do not send silly options in SYNCOOKIES (networking-stable-20_07_17).\n- tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key() barriers (networking-stable-20_07_17).\n- tracepoint: Mark __tracepoint_string\u0027s __used (git-fixes).\n- tracing: Use trace_sched_process_free() instead of exit() for pid tracing (git-fixes).\n- tty: serial: fsl_lpuart: add imx8qxp support (bsc#1175670).\n- tty: serial: fsl_lpuart: free IDs allocated by IDA (bsc#1175670).\n- Update patch reference for a tipc fix patch (bsc#1175515)\n- USB: cdc-acm: rework notification_buffer resizing (git-fixes).\n- usb: gadget: f_tcm: Fix some resource leaks in some error paths (git-fixes).\n- usb: host: ohci-exynos: Fix error handling in exynos_ohci_probe() (git-fixes).\n- USB: Ignore UAS for JMicron JMS567 ATA/ATAPI Bridge (git-fixes).\n- USB: iowarrior: fix up report size handling for some devices (git-fixes).\n- usbip: tools: fix module name in man page (git-fixes).\n- USB: rename USB quirk to USB_QUIRK_ENDPOINT_IGNORE (git-fixes).\n- USB: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).\n- USB: serial: cp210x: re-enable auto-RTS on open (git-fixes).\n- USB: serial: ftdi_sio: clean up receive processing (git-fixes).\n- USB: serial: ftdi_sio: fix break and sysrq handling (git-fixes).\n- USB: serial: ftdi_sio: make process-packet buffer unsigned (git-fixes).\n- USB: serial: iuu_phoenix: fix led-activity helpers (git-fixes).\n- USB: serial: qcserial: add EM7305 QDL product ID (git-fixes).\n- usb: xhci: define IDs for various ASMedia host controllers (git-fixes).\n- usb: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).\n- usb: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).\n- usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).\n- VFS: Check rename_lock in lookup_fast() (bsc#1174734).\n- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).\n- video: pxafb: Fix the function used to balance a \u0027dma_alloc_coherent()\u0027 call (git-fixes).\n- vlan: consolidate VLAN parsing code and limit max parsing depth (networking-stable-20_07_17).\n- vmxnet3: use correct tcp hdr length when packet is encapsulated (bsc#1175199).\n- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (bsc#1111666).\n- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (bsc#1111666).\n- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (bsc#1111666).\n- wl1251: fix always return 0 error (git-fixes).\n- x86/hyperv: Create and use Hyper-V page definitions (git-fixes).\n- x86/hyper-v: Fix overflow bug in fill_gva_list() (git-fixes).\n- x86/hyperv: Make hv_vcpu_is_preempted() visible (git-fixes).\n- xen/balloon: fix accounting in alloc_xenballooned_pages error path (bsc#1065600).\n- xen/balloon: make the balloon wait interruptible (bsc#1065600).\n- xfrm: check id proto in validate_tmpl() (git-fixes).\n- xfrm: clean up xfrm protocol checks (git-fixes).\n- xfrm_user: uncoditionally validate esn replay attribute struct (git-fixes).\n- xfs: fix inode allocation block res calculation precedence (git-fixes).\n- xfs: fix reflink quota reservation accounting error (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-1325", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1325-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:1325-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR7IAIXMEHH4XQP5TC46UTZY6KWF5277/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:1325-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR7IAIXMEHH4XQP5TC46UTZY6KWF5277/" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1083548", "url": "https://bugzilla.suse.com/1083548" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1085308", "url": "https://bugzilla.suse.com/1085308" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1152148", "url": "https://bugzilla.suse.com/1152148" }, { "category": "self", "summary": "SUSE Bug 1163524", "url": "https://bugzilla.suse.com/1163524" }, { "category": "self", "summary": "SUSE Bug 1165629", "url": "https://bugzilla.suse.com/1165629" }, { "category": "self", "summary": "SUSE Bug 1166965", "url": "https://bugzilla.suse.com/1166965" }, { "category": "self", "summary": "SUSE Bug 1169790", "url": "https://bugzilla.suse.com/1169790" }, { "category": "self", "summary": "SUSE Bug 1170232", "url": "https://bugzilla.suse.com/1170232" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1172073", "url": "https://bugzilla.suse.com/1172073" }, { "category": "self", "summary": "SUSE Bug 1172108", "url": "https://bugzilla.suse.com/1172108" }, { "category": "self", "summary": "SUSE Bug 1172418", "url": "https://bugzilla.suse.com/1172418" }, { "category": "self", "summary": "SUSE Bug 1172428", "url": "https://bugzilla.suse.com/1172428" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172871", "url": "https://bugzilla.suse.com/1172871" }, { "category": "self", "summary": "SUSE Bug 1172872", "url": "https://bugzilla.suse.com/1172872" }, { "category": "self", "summary": "SUSE Bug 1172873", "url": "https://bugzilla.suse.com/1172873" }, { "category": "self", "summary": "SUSE Bug 1172963", "url": "https://bugzilla.suse.com/1172963" }, { "category": "self", "summary": "SUSE Bug 1173485", "url": "https://bugzilla.suse.com/1173485" }, { "category": "self", "summary": "SUSE Bug 1173798", "url": "https://bugzilla.suse.com/1173798" }, { "category": "self", "summary": "SUSE Bug 1173954", "url": "https://bugzilla.suse.com/1173954" }, { "category": "self", "summary": "SUSE Bug 1174003", "url": "https://bugzilla.suse.com/1174003" }, { "category": "self", "summary": "SUSE Bug 1174026", "url": "https://bugzilla.suse.com/1174026" }, { "category": "self", "summary": "SUSE Bug 1174205", "url": "https://bugzilla.suse.com/1174205" }, { "category": "self", "summary": "SUSE Bug 1174387", "url": "https://bugzilla.suse.com/1174387" }, { "category": "self", "summary": "SUSE Bug 1174484", "url": "https://bugzilla.suse.com/1174484" }, { "category": "self", "summary": "SUSE Bug 1174547", "url": "https://bugzilla.suse.com/1174547" }, { "category": "self", "summary": "SUSE Bug 1174550", "url": "https://bugzilla.suse.com/1174550" }, { "category": "self", "summary": "SUSE Bug 1174625", "url": "https://bugzilla.suse.com/1174625" }, { "category": "self", "summary": "SUSE Bug 1174689", "url": "https://bugzilla.suse.com/1174689" }, { "category": "self", "summary": "SUSE Bug 1174699", "url": "https://bugzilla.suse.com/1174699" }, { "category": "self", "summary": "SUSE Bug 1174734", "url": "https://bugzilla.suse.com/1174734" }, { "category": "self", "summary": "SUSE Bug 1174771", "url": "https://bugzilla.suse.com/1174771" }, { "category": "self", "summary": "SUSE Bug 1174852", "url": "https://bugzilla.suse.com/1174852" }, { "category": "self", "summary": "SUSE Bug 1174873", "url": "https://bugzilla.suse.com/1174873" }, { "category": "self", "summary": "SUSE Bug 1174904", "url": "https://bugzilla.suse.com/1174904" }, { "category": "self", "summary": "SUSE Bug 1174926", "url": "https://bugzilla.suse.com/1174926" }, { "category": "self", "summary": "SUSE Bug 1174968", "url": "https://bugzilla.suse.com/1174968" }, { "category": "self", "summary": "SUSE Bug 1175062", "url": "https://bugzilla.suse.com/1175062" }, { "category": "self", "summary": "SUSE Bug 1175063", "url": "https://bugzilla.suse.com/1175063" }, { "category": "self", "summary": "SUSE Bug 1175064", "url": "https://bugzilla.suse.com/1175064" }, { "category": "self", "summary": "SUSE Bug 1175065", "url": "https://bugzilla.suse.com/1175065" }, { "category": "self", "summary": "SUSE Bug 1175066", "url": "https://bugzilla.suse.com/1175066" }, { "category": "self", "summary": "SUSE Bug 1175067", "url": "https://bugzilla.suse.com/1175067" }, { "category": "self", "summary": "SUSE Bug 1175112", "url": "https://bugzilla.suse.com/1175112" }, { "category": "self", "summary": "SUSE Bug 1175127", "url": "https://bugzilla.suse.com/1175127" }, { "category": "self", "summary": "SUSE Bug 1175128", "url": "https://bugzilla.suse.com/1175128" }, { "category": "self", "summary": "SUSE Bug 1175149", "url": "https://bugzilla.suse.com/1175149" }, { "category": "self", "summary": "SUSE Bug 1175199", "url": "https://bugzilla.suse.com/1175199" }, { "category": "self", "summary": "SUSE Bug 1175213", "url": "https://bugzilla.suse.com/1175213" }, { "category": "self", "summary": "SUSE Bug 1175228", "url": "https://bugzilla.suse.com/1175228" }, { "category": "self", "summary": "SUSE Bug 1175232", "url": "https://bugzilla.suse.com/1175232" }, { "category": "self", "summary": "SUSE Bug 1175284", "url": "https://bugzilla.suse.com/1175284" }, { "category": "self", "summary": "SUSE Bug 1175393", "url": "https://bugzilla.suse.com/1175393" }, { "category": "self", "summary": "SUSE Bug 1175394", "url": "https://bugzilla.suse.com/1175394" }, { "category": "self", "summary": "SUSE Bug 1175396", "url": "https://bugzilla.suse.com/1175396" }, { "category": "self", "summary": "SUSE Bug 1175397", "url": "https://bugzilla.suse.com/1175397" }, { "category": "self", "summary": "SUSE Bug 1175398", "url": "https://bugzilla.suse.com/1175398" }, { "category": "self", "summary": "SUSE Bug 1175399", "url": "https://bugzilla.suse.com/1175399" }, { "category": "self", "summary": "SUSE Bug 1175400", "url": "https://bugzilla.suse.com/1175400" }, { "category": "self", "summary": "SUSE Bug 1175401", "url": "https://bugzilla.suse.com/1175401" }, { "category": "self", "summary": "SUSE Bug 1175402", "url": "https://bugzilla.suse.com/1175402" }, { "category": "self", "summary": "SUSE Bug 1175403", "url": "https://bugzilla.suse.com/1175403" }, { "category": "self", "summary": "SUSE Bug 1175404", "url": "https://bugzilla.suse.com/1175404" }, { "category": "self", "summary": "SUSE Bug 1175405", "url": "https://bugzilla.suse.com/1175405" }, { "category": "self", "summary": "SUSE Bug 1175406", "url": "https://bugzilla.suse.com/1175406" }, { "category": "self", "summary": "SUSE Bug 1175407", "url": "https://bugzilla.suse.com/1175407" }, { "category": "self", "summary": "SUSE Bug 1175408", "url": "https://bugzilla.suse.com/1175408" }, { "category": "self", "summary": "SUSE Bug 1175409", "url": "https://bugzilla.suse.com/1175409" }, { "category": "self", "summary": "SUSE Bug 1175410", "url": "https://bugzilla.suse.com/1175410" }, { "category": "self", "summary": "SUSE Bug 1175411", "url": "https://bugzilla.suse.com/1175411" }, { "category": "self", "summary": "SUSE Bug 1175412", "url": "https://bugzilla.suse.com/1175412" }, { "category": "self", "summary": "SUSE Bug 1175413", "url": "https://bugzilla.suse.com/1175413" }, { "category": "self", "summary": "SUSE Bug 1175414", "url": "https://bugzilla.suse.com/1175414" }, { "category": "self", "summary": "SUSE Bug 1175415", "url": "https://bugzilla.suse.com/1175415" }, { "category": "self", "summary": "SUSE Bug 1175416", "url": "https://bugzilla.suse.com/1175416" }, { "category": "self", "summary": "SUSE Bug 1175417", "url": "https://bugzilla.suse.com/1175417" }, { "category": "self", "summary": "SUSE Bug 1175418", "url": "https://bugzilla.suse.com/1175418" }, { "category": "self", "summary": "SUSE Bug 1175419", "url": "https://bugzilla.suse.com/1175419" }, { "category": "self", "summary": "SUSE Bug 1175420", "url": "https://bugzilla.suse.com/1175420" }, { "category": "self", "summary": "SUSE Bug 1175421", "url": "https://bugzilla.suse.com/1175421" }, { "category": "self", "summary": "SUSE Bug 1175422", "url": "https://bugzilla.suse.com/1175422" }, { "category": "self", "summary": "SUSE Bug 1175423", "url": "https://bugzilla.suse.com/1175423" }, { "category": "self", "summary": "SUSE Bug 1175440", "url": "https://bugzilla.suse.com/1175440" }, { "category": "self", "summary": "SUSE Bug 1175493", "url": "https://bugzilla.suse.com/1175493" }, { "category": "self", "summary": "SUSE Bug 1175515", "url": "https://bugzilla.suse.com/1175515" }, { "category": "self", "summary": "SUSE Bug 1175518", "url": "https://bugzilla.suse.com/1175518" }, { "category": "self", "summary": "SUSE Bug 1175526", "url": "https://bugzilla.suse.com/1175526" }, { "category": "self", "summary": "SUSE Bug 1175550", "url": "https://bugzilla.suse.com/1175550" }, { "category": "self", "summary": "SUSE Bug 1175654", "url": "https://bugzilla.suse.com/1175654" }, { "category": "self", "summary": "SUSE Bug 1175666", "url": "https://bugzilla.suse.com/1175666" }, { "category": "self", "summary": "SUSE Bug 1175667", "url": "https://bugzilla.suse.com/1175667" }, { "category": "self", "summary": "SUSE Bug 1175668", "url": "https://bugzilla.suse.com/1175668" }, { "category": "self", "summary": "SUSE Bug 1175669", "url": "https://bugzilla.suse.com/1175669" }, { "category": "self", "summary": "SUSE Bug 1175670", "url": "https://bugzilla.suse.com/1175670" }, { "category": "self", "summary": "SUSE Bug 1175767", "url": "https://bugzilla.suse.com/1175767" }, { "category": "self", "summary": "SUSE Bug 1175768", "url": "https://bugzilla.suse.com/1175768" }, { "category": "self", "summary": "SUSE Bug 1175769", "url": "https://bugzilla.suse.com/1175769" }, { "category": "self", "summary": "SUSE Bug 1175770", "url": "https://bugzilla.suse.com/1175770" }, { "category": "self", "summary": "SUSE Bug 1175771", "url": "https://bugzilla.suse.com/1175771" }, { "category": "self", "summary": "SUSE Bug 1175772", "url": "https://bugzilla.suse.com/1175772" }, { "category": "self", "summary": "SUSE Bug 1175786", "url": "https://bugzilla.suse.com/1175786" }, { "category": "self", "summary": "SUSE Bug 1175873", "url": "https://bugzilla.suse.com/1175873" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3639 page", "url": "https://www.suse.com/security/cve/CVE-2018-3639/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14314 page", "url": "https://www.suse.com/security/cve/CVE-2020-14314/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14356 page", "url": "https://www.suse.com/security/cve/CVE-2020-14356/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1749 page", "url": "https://www.suse.com/security/cve/CVE-2020-1749/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24394 page", "url": "https://www.suse.com/security/cve/CVE-2020-24394/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-09-02T14:23:30Z", "generator": { "date": "2020-09-02T14:23:30Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:1325-1", "initial_release_date": "2020-09-02T14:23:30Z", "revision_history": [ { "date": "2020-09-02T14:23:30Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-lp151.28.63.1.noarch", "product": { "name": "kernel-devel-4.12.14-lp151.28.63.1.noarch", "product_id": "kernel-devel-4.12.14-lp151.28.63.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-lp151.28.63.1.noarch", "product": { "name": "kernel-docs-4.12.14-lp151.28.63.1.noarch", "product_id": "kernel-docs-4.12.14-lp151.28.63.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-lp151.28.63.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-lp151.28.63.1.noarch", "product_id": "kernel-docs-html-4.12.14-lp151.28.63.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-lp151.28.63.1.noarch", "product": { "name": "kernel-macros-4.12.14-lp151.28.63.1.noarch", "product_id": "kernel-macros-4.12.14-lp151.28.63.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-lp151.28.63.1.noarch", "product": { "name": "kernel-source-4.12.14-lp151.28.63.1.noarch", "product_id": "kernel-source-4.12.14-lp151.28.63.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.12.14-lp151.28.63.1.x86_64", "product": { "name": "kernel-debug-4.12.14-lp151.28.63.1.x86_64", "product_id": "kernel-debug-4.12.14-lp151.28.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-lp151.28.63.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-lp151.28.63.1.x86_64", "product_id": "kernel-debug-base-4.12.14-lp151.28.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-lp151.28.63.1.x86_64", "product": { "name": "kernel-default-4.12.14-lp151.28.63.1.x86_64", "product_id": "kernel-default-4.12.14-lp151.28.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-lp151.28.63.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-lp151.28.63.1.x86_64", "product_id": "kernel-default-base-4.12.14-lp151.28.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-lp151.28.63.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-lp151.28.63.1.x86_64", "product_id": "kernel-default-devel-4.12.14-lp151.28.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-lp151.28.63.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-lp151.28.63.1.x86_64", "product_id": "kernel-obs-build-4.12.14-lp151.28.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-lp151.28.63.1.x86_64", "product": { "name": "kernel-syms-4.12.14-lp151.28.63.1.x86_64", "product_id": "kernel-syms-4.12.14-lp151.28.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-lp151.28.63.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-lp151.28.63.1.x86_64", "product_id": "kernel-vanilla-4.12.14-lp151.28.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64" }, "product_reference": "kernel-debug-4.12.14-lp151.28.63.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64" }, "product_reference": "kernel-debug-base-4.12.14-lp151.28.63.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64" }, "product_reference": "kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64" }, "product_reference": "kernel-default-4.12.14-lp151.28.63.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-lp151.28.63.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-lp151.28.63.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-lp151.28.63.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch" }, "product_reference": "kernel-devel-4.12.14-lp151.28.63.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-lp151.28.63.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch" }, "product_reference": "kernel-docs-4.12.14-lp151.28.63.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.12.14-lp151.28.63.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch" }, "product_reference": "kernel-docs-html-4.12.14-lp151.28.63.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64" }, "product_reference": "kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64" }, "product_reference": "kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64" }, "product_reference": "kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-lp151.28.63.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch" }, "product_reference": "kernel-macros-4.12.14-lp151.28.63.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-lp151.28.63.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64" }, "product_reference": "kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-lp151.28.63.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch" }, "product_reference": "kernel-source-4.12.14-lp151.28.63.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch" }, "product_reference": "kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-lp151.28.63.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64" }, "product_reference": "kernel-vanilla-4.12.14-lp151.28.63.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64" }, "product_reference": "kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-3639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3639" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3639", "url": "https://www.suse.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1085235 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085235" }, { "category": "external", "summary": "SUSE Bug 1085308 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085308" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092631 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092631" }, { "category": "external", "summary": "SUSE Bug 1092885 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092885" }, { "category": "external", "summary": "SUSE Bug 1094912 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1094912" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100394 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1100394" }, { "category": "external", "summary": "SUSE Bug 1102640 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1102640" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1105412" }, { "category": "external", "summary": "SUSE Bug 1111963 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1111963" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172781" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172782" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172783" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-02T14:23:30Z", "details": "moderate" } ], "title": "CVE-2018-3639" }, { "cve": "CVE-2020-14314", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14314" } ], "notes": [ { "category": "general", "text": "A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14314", "url": "https://www.suse.com/security/cve/CVE-2020-14314" }, { "category": "external", "summary": "SUSE Bug 1173798 for CVE-2020-14314", "url": "https://bugzilla.suse.com/1173798" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-02T14:23:30Z", "details": "moderate" } ], "title": "CVE-2020-14314" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-02T14:23:30Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14356" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14356", "url": "https://www.suse.com/security/cve/CVE-2020-14356" }, { "category": "external", "summary": "SUSE Bug 1175213 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1175213" }, { "category": "external", "summary": "SUSE Bug 1176392 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1176392" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-02T14:23:30Z", "details": "moderate" } ], "title": "CVE-2020-14356" }, { "cve": "CVE-2020-1749", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1749" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1749", "url": "https://www.suse.com/security/cve/CVE-2020-1749" }, { "category": "external", "summary": "SUSE Bug 1165629 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165629" }, { "category": "external", "summary": "SUSE Bug 1165631 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165631" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177513" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1189302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-02T14:23:30Z", "details": "important" } ], "title": "CVE-2020-1749" }, { "cve": "CVE-2020-24394", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24394" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24394", "url": "https://www.suse.com/security/cve/CVE-2020-24394" }, { "category": "external", "summary": "SUSE Bug 1175518 for CVE-2020-24394", "url": "https://bugzilla.suse.com/1175518" }, { "category": "external", "summary": "SUSE Bug 1175992 for CVE-2020-24394", "url": "https://bugzilla.suse.com/1175992" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-02T14:23:30Z", "details": "important" } ], "title": "CVE-2020-24394" } ] }
suse-su-2020:2531-1
Vulnerability from csaf_suse
Published
2020-09-04 11:34
Modified
2020-09-04 11:34
Summary
Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP1)
Description of the patch
This update for the Linux Kernel 4.12.14-197_37 fixes several issues.
The following security issues were fixed:
- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2020-15780: Fixed a lockdown bypass via injection of malicious ACPI tables via configfs (bsc#1174186).
- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
Patchnames
SUSE-2020-2531,SUSE-SLE-Live-Patching-12-SP5-2020-2514,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2530,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2531
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-197_37 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).\n- CVE-2020-15780: Fixed a lockdown bypass via injection of malicious ACPI tables via configfs (bsc#1174186).\n- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).\n- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2531,SUSE-SLE-Live-Patching-12-SP5-2020-2514,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2530,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2531", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2531-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2531-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202531-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2531-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007353.html" }, { "category": "self", "summary": "SUSE Bug 1173942", "url": "https://bugzilla.suse.com/1173942" }, { "category": "self", "summary": "SUSE Bug 1173963", "url": "https://bugzilla.suse.com/1173963" }, { "category": "self", "summary": "SUSE Bug 1174186", "url": "https://bugzilla.suse.com/1174186" }, { "category": "self", "summary": "SUSE Bug 1174247", "url": "https://bugzilla.suse.com/1174247" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9458 page", "url": "https://www.suse.com/security/cve/CVE-2019-9458/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11668 page", "url": "https://www.suse.com/security/cve/CVE-2020-11668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" } ], "title": "Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP1)", "tracking": { "current_release_date": "2020-09-04T11:34:09Z", "generator": { "date": "2020-09-04T11:34:09Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2531-1", "initial_release_date": "2020-09-04T11:34:09Z", "revision_history": [ { "date": "2020-09-04T11:34:09Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_37-default-5-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_37-default-5-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_37-default-5-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_17-default-5-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_17-default-5-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_17-default-5-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_34-default-5-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_34-default-5-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_34-default-5-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_17-default-5-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-122_17-default-5-2.2.s390x", "product_id": "kgraft-patch-4_12_14-122_17-default-5-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_37-default-5-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_37-default-5-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-197_37-default-5-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_17-default-5-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_17-default-5-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_17-default-5-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_34-default-5-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_34-default-5-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-197_34-default-5-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-5-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-5-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_17-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_17-default-5-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_34-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_34-default-5-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_34-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_34-default-5-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_37-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_37-default-5-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_37-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_37-default-5-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_34-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_34-default-5-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_34-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_34-default-5-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_37-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_37-default-5-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_37-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_37-default-5-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9458", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9458" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9458", "url": "https://www.suse.com/security/cve/CVE-2019-9458" }, { "category": "external", "summary": "SUSE Bug 1168295 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1168295" }, { "category": "external", "summary": "SUSE Bug 1173963 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1173963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:34:09Z", "details": "important" } ], "title": "CVE-2019-9458" }, { "cve": "CVE-2020-11668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11668" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11668", "url": "https://www.suse.com/security/cve/CVE-2020-11668" }, { "category": "external", "summary": "SUSE Bug 1168952 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1168952" }, { "category": "external", "summary": "SUSE Bug 1173942 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1173942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:34:09Z", "details": "important" } ], "title": "CVE-2020-11668" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:34:09Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-5-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-5-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:34:09Z", "details": "important" } ], "title": "CVE-2020-15780" } ] }
suse-su-2020:2498-1
Vulnerability from csaf_suse
Published
2020-09-04 11:29
Modified
2020-09-04 11:29
Summary
Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP3)
Description of the patch
This update for the Linux Kernel 4.4.180-94_113 fixes several issues.
The following security issues were fixed:
- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2019-19447: Fixed a use-after-free in ext4_put_super (bsc#1173869).
- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173100).
Patchnames
SUSE-2020-2498,SUSE-SLE-SAP-12-SP3-2020-2498,SUSE-SLE-SERVER-12-SP3-2020-2498
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.180-94_113 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).\n- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).\n- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).\n- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).\n- CVE-2019-19447: Fixed a use-after-free in ext4_put_super (bsc#1173869).\n- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173100).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2498,SUSE-SLE-SAP-12-SP3-2020-2498,SUSE-SLE-SERVER-12-SP3-2020-2498", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2498-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2498-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202498-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2498-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007370.html" }, { "category": "self", "summary": "SUSE Bug 1173100", "url": "https://bugzilla.suse.com/1173100" }, { "category": "self", "summary": "SUSE Bug 1173659", "url": "https://bugzilla.suse.com/1173659" }, { "category": "self", "summary": "SUSE Bug 1173869", "url": "https://bugzilla.suse.com/1173869" }, { "category": "self", "summary": "SUSE Bug 1173942", "url": "https://bugzilla.suse.com/1173942" }, { "category": "self", "summary": "SUSE Bug 1173963", "url": "https://bugzilla.suse.com/1173963" }, { "category": "self", "summary": "SUSE Bug 1174247", "url": "https://bugzilla.suse.com/1174247" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14895 page", "url": "https://www.suse.com/security/cve/CVE-2019-14895/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19447 page", "url": "https://www.suse.com/security/cve/CVE-2019-19447/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9458 page", "url": "https://www.suse.com/security/cve/CVE-2019-9458/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11668 page", "url": "https://www.suse.com/security/cve/CVE-2020-11668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" } ], "title": "Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP3)", "tracking": { "current_release_date": "2020-09-04T11:29:42Z", "generator": { "date": "2020-09-04T11:29:42Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2498-1", "initial_release_date": "2020-09-04T11:29:42Z", "revision_history": [ { "date": "2020-09-04T11:29:42Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "product": { "name": "kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "product_id": "kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64", "product": { "name": "kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64", "product_id": "kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-14895", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14895" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14895", "url": "https://www.suse.com/security/cve/CVE-2019-14895" }, { "category": "external", "summary": "SUSE Bug 1157042 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1157042" }, { "category": "external", "summary": "SUSE Bug 1157158 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1157158" }, { "category": "external", "summary": "SUSE Bug 1173100 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1173100" }, { "category": "external", "summary": "SUSE Bug 1173660 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1173660" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:42Z", "details": "important" } ], "title": "CVE-2019-14895" }, { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:42Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2019-19447", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19447" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19447", "url": "https://www.suse.com/security/cve/CVE-2019-19447" }, { "category": "external", "summary": "SUSE Bug 1158819 for CVE-2019-19447", "url": "https://bugzilla.suse.com/1158819" }, { "category": "external", "summary": "SUSE Bug 1173869 for CVE-2019-19447", "url": "https://bugzilla.suse.com/1173869" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:42Z", "details": "important" } ], "title": "CVE-2019-19447" }, { "cve": "CVE-2019-9458", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9458" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9458", "url": "https://www.suse.com/security/cve/CVE-2019-9458" }, { "category": "external", "summary": "SUSE Bug 1168295 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1168295" }, { "category": "external", "summary": "SUSE Bug 1173963 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1173963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:42Z", "details": "important" } ], "title": "CVE-2019-9458" }, { "cve": "CVE-2020-11668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11668" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11668", "url": "https://www.suse.com/security/cve/CVE-2020-11668" }, { "category": "external", "summary": "SUSE Bug 1168952 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1168952" }, { "category": "external", "summary": "SUSE Bug 1173942 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1173942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:42Z", "details": "important" } ], "title": "CVE-2020-11668" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_113-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:42Z", "details": "important" } ], "title": "CVE-2020-14331" } ] }
suse-su-2020:2575-1
Vulnerability from csaf_suse
Published
2020-09-09 05:16
Modified
2020-09-09 05:16
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup (bsc#1165629).
- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).
- CVE-2020-14356: Fixed a null pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213).
- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).
- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).
- CVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).
- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication Bluetooth might have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access (bsc#1171988).
- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).
The following non-security bugs were fixed:
- ACPI: kABI fixes for subsys exports (bsc#1174968).
- ACPI / LPSS: Resume BYT/CHT I2C controllers from resume_noirq (bsc#1174968).
- ACPI / LPSS: Use acpi_lpss_* instead of acpi_subsys_* functions for hibernate (bsc#1174968).
- ACPI: PM: Introduce 'poweroff' callbacks for ACPI PM domain and LPSS (bsc#1174968).
- ACPI: PM: Simplify and fix PM domain hibernation callbacks (bsc#1174968).
- af_key: pfkey_dump needs parameter validation (git-fixes).
- agp/intel: Fix a memory leak on module initialisation failure (git-fixes).
- ALSA: core: pcm_iec958: fix kernel-doc (bsc#1111666).
- ALSA: echoaduio: Drop superfluous volatile modifier (bsc#1111666).
- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (bsc#1111666).
- ALSA: hda: Add support for Loongson 7A1000 controller (bsc#1111666).
- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (bsc#1111666).
- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (bsc#1111666).
- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (bsc#1111666).
- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).
- ALSA: hda: fix snd_hda_codec_cleanup() documentation (bsc#1111666).
- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (bsc#1111666).
- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (bsc#1111666).
- ALSA: hda/realtek: Add model alc298-samsung-headphone (git-fixes).
- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (bsc#1111666).
- ALSA: hda/realtek - Add quirk for Lenovo Carbon X1 8th gen (bsc#1111666).
- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (bsc#1111666).
- ALSA: hda/realtek - Add quirk for MSI GL63 (bsc#1111666).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex Book (git-fixes).
- ALSA: hda/realtek - change to suitable link model for ASUS platform (bsc#1111666).
- ALSA: hda/realtek - Check headset type by unplug and resume (bsc#1111666).
- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (bsc#1111666).
- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (bsc#1111666).
- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (bsc#1111666).
- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (bsc#1111666).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (bsc#1111666).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (bsc#1111666).
- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (bsc#1111666).
- ALSA: hda/realtek: Fix add a 'ultra_low_power' function for intel reference board (alc256) (bsc#1111666).
- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (bsc#1111666).
- ALSA: hda/realtek - Fixed HP right speaker no sound (bsc#1111666).
- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (bsc#1111666).
- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (bsc#1111666).
- ALSA: hda/realtek - Fix unused variable warning (bsc#1111666).
- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (bsc#1111666).
- ALSA: hda - reverse the setting value in the micmute_led_set (bsc#1111666).
- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).
- ALSA: pci: delete repeated words in comments (bsc#1111666).
- ALSA: seq: oss: Serialize ioctls (bsc#1111666).
- ALSA: usb-audio: Add capture support for Saffire 6 (USB 1.1) (git-fixes).
- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (bsc#1111666).
- ALSA: usb-audio: add startech usb audio dock name (bsc#1111666).
- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (bsc#1111666).
- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (bsc#1111666).
- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (bsc#1111666).
- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (bsc#1111666).
- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).
- ALSA: usb-audio: fix spelling mistake 'buss' -> 'bus' (bsc#1111666).
- ALSA: usb-audio: ignore broken processing/extension unit (git-fixes).
- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (bsc#1111666).
- ALSA: usb/line6: remove 'defined but not used' warning (bsc#1111666).
- arm64: Add MIDR encoding for HiSilicon Taishan CPUs (bsc#1174547).
- arm64: Add MIDR encoding for NVIDIA CPUs (bsc#1174547).
- arm64: add sysfs vulnerability show for meltdown (bsc#1174547).
- arm64: Add sysfs vulnerability show for spectre-v1 (bsc#1174547).
- arm64: add sysfs vulnerability show for spectre-v2 (bsc#1174547).
- arm64: add sysfs vulnerability show for speculative store bypass (bsc#1174547).
- arm64: Advertise mitigation of Spectre-v2, or lack thereof (bsc#1174547).
- arm64: Always enable spectre-v2 vulnerability detection (bsc#1174547).
- arm64: Always enable ssb vulnerability detection (bsc#1174547).
- arm64: backtrace: Do not bother trying to unwind the userspace stack (bsc#1175397).
- arm64: capabilities: Add NVIDIA Denver CPU to bp_harden list (bsc#1174547).
- arm64: capabilities: Merge duplicate Cavium erratum entries (bsc#1174547).
- arm64: capabilities: Merge entries for ARM64_WORKAROUND_CLEAN_CACHE (bsc#1174547).
- arm64: cpufeature: Enable Qualcomm Falkor/Kryo errata 1003 (bsc#1175398).
- arm64: Do not mask out PTE_RDONLY in pte_same() (bsc#1175393).
- arm64: enable generic CPU vulnerabilites support (bsc#1174547). Update config/arm64/default
- arm64: Ensure VM_WRITE|VM_SHARED ptes are clean by default (bsc#1175394).
- arm64: errata: Do not define type field twice for arm64_errata entries (bsc#1174547).
- arm64: errata: Update stale comment (bsc#1174547).
- arm64: Get rid of __smccc_workaround_1_hvc_* (bsc#1174547).
- arm64: kpti: Avoid rewriting early page tables when KASLR is enabled (bsc#1174547).
- arm64: kpti: Update arm64_kernel_use_ng_mappings() when forced on (bsc#1174547).
- arm64: kpti: Whitelist Cortex-A CPUs that do not implement the CSV3 field (bsc#1174547).
- arm64: kpti: Whitelist HiSilicon Taishan v110 CPUs (bsc#1174547).
- arm64: KVM: Avoid setting the upper 32 bits of VTCR_EL2 to 1 (bsc#1133021).
- arm64: KVM: Guests can skip __install_bp_hardening_cb()s HYP work (bsc#1174547).
- arm64: KVM: Use SMCCC_ARCH_WORKAROUND_1 for Falkor BP hardening (bsc#1174547).
- arm64: mm: Fix pte_mkclean, pte_mkdirty semantics (bsc#1175526).
- arm64: Provide a command line to disable spectre_v2 mitigation (bsc#1174547).
- arm64: Silence clang warning on mismatched value/register sizes (bsc#1175396).
- arm64/speculation: Support 'mitigations=' cmdline option (bsc#1174547).
- arm64: ssbd: explicitly depend on <linux/prctl.h> (bsc#1175399).
- arm64: ssbs: Do not treat CPUs with SSBS as unaffected by SSB (bsc#1174547).
- arm64: ssbs: Fix context-switch when SSBS is present on all CPUs (bsc#1175669).
- arm64/sve: Fix wrong free for task->thread.sve_state (bsc#1175400).
- arm64/sve: <uapi/asm/ptrace.h> should not depend on <uapi/linux/prctl.h> (bsc#1175401).
- arm64: tlbflush: avoid writing RES0 bits (bsc#1175402).
- arm64: Use firmware to detect CPUs that are not affected by Spectre-v2 (bsc#1174547).
- ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17 (bsc#1133021).
- ARM: KVM: invalidate icache on guest exit for Cortex-A15 (bsc#1133021).
- ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15 (bsc#1133021).
- ASoC: hda/tegra: Set buffer alignment to 128 bytes (bsc#1111666).
- ASoC: intel: Fix memleak in sst_media_open (git-fixes).
- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).
- AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).
- AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).
- AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).
- ax88172a: fix ax88172a_unbind() failures (git-fixes).
- b43: Remove uninitialized_var() usage (git-fixes).
- bcache: allocate meta data pages as compound pages (bsc#1172873).
- block: check queue's limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).
- block: Fix use-after-free in blkdev_get() (bsc#1174843).
- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).
- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (bsc#1111666).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (bsc#1111666).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (bsc#1111666).
- bonding: fix active-backup failover for current ARP slave (bsc#1174771).
- bonding: fix a potential double-unregister (git-fixes).
- bonding: show saner speed for broadcast mode (git-fixes).
- bpf: Fix map leak in HASH_OF_MAPS map (git-fixes).
- brcmfmac: keep SDIO watchdog running when console_interval is non-zero (bsc#1111666).
- brcmfmac: set state of hanger slot to FREE when flushing PSQ (bsc#1111666).
- brcmfmac: To fix Bss Info flag definition Bug (bsc#1111666).
- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).
- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).
- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).
- btrfs: fix block group leak when removing fails (bsc#1175149).
- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).
- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).
- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).
- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).
- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).
- btrfs: fix memory leaks after failure to lookup checksums during inode logging (bsc#1175550).
- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).
- btrfs: fix race between block group removal and block group creation (bsc#1175149).
- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).
- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).
- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).
- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).
- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).
- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).
- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).
- btrfs: Open code btrfs_write_and_wait_marked_extents (bsc#1175149).
- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).
- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).
- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).
- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).
- btrfs: Rename and export clear_btree_io_tree (bsc#1175149).
- btrfs: treat RWF_{,D}SYNC writes as sync for CRCs (bsc#1175493).
- bus: hisi_lpc: Add .remove method to avoid driver unbind crash (bsc#1174658).
- bus: hisi_lpc: Do not fail probe for unrecognised child devices (bsc#1174658).
- bus: hisi_lpc: Unregister logical PIO range to avoid potential use-after-free (bsc#1174658).
- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).
- cfg80211: check vendor command doit pointer before use (git-fixes).
- char: virtio: Select VIRTIO from VIRTIO_CONSOLE (bsc#1175667).
- cifs: document and cleanup dfs mount (bsc#1144333 bsc#1172428).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1144333 bsc#1172428).
- cifs: fix double free error on share and prefix (bsc#1144333 bsc#1172428).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1144333 bsc#1172428).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1144333 bsc#1172428).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1144333 bsc#1172428).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1144333 bsc#1172428).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1144333 bsc#1172428).
- cifs: rename reconn_inval_dfs_target() (bsc#1144333 bsc#1172428).
- clk: at91: clk-generated: check best_rate against ranges (bsc#1111666).
- clk: clk-atlas6: fix return value check in atlas6_clk_init() (bsc#1111666).
- clk: iproc: round clock rate to the closest (bsc#1111666).
- clk: spear: Remove uninitialized_var() usage (git-fixes).
- clk: st: Remove uninitialized_var() usage (git-fixes).
- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1174549
- console: newport_con: fix an issue about leak related system resources (git-fixes).
- constrants: fix malformed XML Closing tag of an element is '</foo>', not '<foo/>'. Fixes: 8b37de2eb835 ('rpm/constraints.in: Increase memory for kernel-docs')
- Created new preempt kernel flavor (jsc#SLE-11309) Configs are cloned from the respective $arch/default configs. All changed configs appart from CONFIG_PREEMPT->y are a result of dependencies, namely many lock/unlock primitives are no longer inlined in the preempt kernel. TREE_RCU has been also changed to PREEMPT_RCU which is the default implementation for PREEMPT kernel.
- crypto: ccp - Fix use of merged scatterlists (git-fixes).
- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).
- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).
- crypto: rockchip - fix scatterlist nents error (git-fixes).
- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).
- crypto: talitos - check AES key size (git-fixes).
- crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK (git-fixes).
- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- dev: Defer free of skbs in flush_backlog (git-fixes).
- device property: Fix the secondary firmware node handling in set_primary_fwnode() (git-fixes).
- devres: keep both device name and resource name in pretty name (git-fixes).
- dlm: Fix kobject memleak (bsc#1175768).
- dlm: remove BUG() before panic() (bsc#1174844).
- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).
- Documentation/networking: Add net DIM documentation (bsc#1174852).
- dpaa2-eth: Fix passing zero to 'PTR_ERR' warning (bsc#1175403).
- dpaa2-eth: free already allocated channels on probe defer (bsc#1175404).
- dpaa2-eth: prevent array underflow in update_cls_rule() (bsc#1175405).
- dpaa_eth: add dropped frames to percpu ethtool stats (bsc#1174550).
- dpaa_eth: add newline in dev_err() msg (bsc#1174550).
- dpaa_eth: avoid timestamp read on error paths (bsc#1175406).
- dpaa_eth: change DMA device (bsc#1174550).
- dpaa_eth: cleanup skb_to_contig_fd() (bsc#1174550).
- dpaa_eth: defer probing after qbman (bsc#1174550).
- dpaa_eth: extend delays in ndo_stop (bsc#1174550).
- dpaa_eth: fix DMA mapping leak (bsc#1174550).
- dpaa_eth: Fix one possible memleak in dpaa_eth_probe (bsc#1174550).
- dpaa_eth: FMan erratum A050385 workaround (bsc#1174550).
- dpaa_eth: perform DMA unmapping before read (bsc#1175407).
- dpaa_eth: register a device link for the qman portal used (bsc#1174550).
- dpaa_eth: remove netdev_err() for user errors (bsc#1174550).
- dpaa_eth: remove redundant code (bsc#1174550).
- dpaa_eth: simplify variables used in dpaa_cleanup_tx_fd() (bsc#1174550).
- dpaa_eth: use a page to store the SGT (bsc#1174550).
- dpaa_eth: use fd information in dpaa_cleanup_tx_fd() (bsc#1174550).
- dpaa_eth: use only one buffer pool per interface (bsc#1174550).
- dpaa_eth: use page backed rx buffers (bsc#1174550).
- driver core: Avoid binding drivers to dead devices (git-fixes).
- Drivers: hv: balloon: Remove dependencies on guest page size (git-fixes).
- Drivers: hv: vmbus: Fix virt_to_hvpfn() for X86_PAE (git-fixes).
- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127, bsc#1175128).
- Drivers: hv: vmbus: Remove the undesired put_cpu_ptr() in hv_synic_cleanup() (git-fixes).
- drivers/perf: hisi: Fix typo in events attribute array (bsc#1175408).
- drivers/perf: hisi: Fixup one DDRC PMU register offset (bsc#1175410).
- drivers/perf: hisi: Fix wrong value for all counters enable (bsc#1175409).
- drm: Added orientation quirk for ASUS tablet model T103HAF (bsc#1111666).
- drm/amd/display: fix pow() crashing when given base 0 (git-fixes).
- drm/amdgpu: avoid dereferencing a NULL pointer (bsc#1111666).
- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (bsc#1111666).
- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (bsc#1113956) * refresh for context changes
- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).
- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1113956)
- drm/arm: fix unintentional integer overflow on left shift (git-fixes).
- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1113956) * refreshed for context changes
- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).
- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1113956) * move drm_mipi_dbi.c -> tinydrm/mipi-drm.c * refresh for context changes
- drm/debugfs: fix plain echo to connector 'force' attribute (bsc#1111666).
- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).
- drm/etnaviv: fix ref count leak via pm_runtime_get_sync (bsc#1111666).
- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (bsc#1112178) * updated names of get/put functions
- drm: hold gem reference until object is no longer accessed (bsc#1113956)
- drm/imx: fix use after free (git-fixes).
- drm/imx: imx-ldb: Disable both channels for split mode in enc->disable() (git-fixes).
- drm/imx: tve: fix regulator_disable error path (git-fixes).
- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).
- drm/msm/adreno: fix updating ring fence (git-fixes).
- drm/msm: ratelimit crtc event overflow error (bsc#1111666).
- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).
- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).
- drm/nouveau: fix multiple instances of reference count leaks (bsc#1111666).
- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).
- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).
- drm/radeon: disable AGP by default (bsc#1111666).
- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).
- drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync (bsc#1111666).
- drm/rockchip: fix VOP_WIN_GET macro (bsc#1175411).
- drm/tilcdc: fix leak & null ref in panel_connector_get_modes (bsc#1111666).
- drm/ttm/nouveau: do not call tt destroy callback on alloc failure (bsc#1175232).
- drm/vmwgfx: Fix two list_for_each loop exit tests (bsc#1111666).
- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (bsc#1111666).
- drm/xen-front: Fix misused IS_ERR_OR_NULL checks (bsc#1065600).
- efi/memreserve: deal with memreserve entries in unmapped memory (bsc#1174685).
- ext4: check journal inode extents more carefully (bsc#1173485).
- ext4: do not allow overlapping system zones (bsc#1173485).
- ext4: fix checking of directory entry validity for inline directories (bsc#1175771).
- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1174840).
- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).
- fat: do not allow to mount if the FAT length == 0 (bsc#1174845).
- fbdev: Detect integer underflow at 'struct fbcon_ops'->clear_margins. (bsc#1112178) * move files drivers/video/fbdev/core -> drivers/video/console * refresh for context changes
- firmware: google: check if size is valid when decoding VPD data (git-fixes).
- firmware: google: increment VPD key_len properly (git-fixes).
- fpga: dfl: fix bug in port reset handshake (git-fixes).
- fsl/fman: add API to get the device behind a fman port (bsc#1174550).
- fsl/fman: check dereferencing null pointer (git-fixes).
- fsl/fman: detect FMan erratum A050385 (bsc#1174550).
- fsl/fman: do not touch liodn base regs reserved on non-PAMU SoCs (bsc#1174550).
- fsl/fman: fix dereference null return value (git-fixes).
- fsl/fman: fix eth hash table allocation (git-fixes).
- fsl/fman: fix unreachable code (git-fixes).
- fsl/fman: remove unused struct member (bsc#1174550).
- fsl/fman: use 32-bit unsigned integer (git-fixes).
- fuse: fix memleak in cuse_channel_open (bsc#1174926).
- fuse: fix missing unlock_page in fuse_writepage() (bsc#1174904).
- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175062).
- fuse: fix weird page warning (bsc#1175063).
- fuse: flush dirty data/metadata before non-truncate setattr (bsc#1175064).
- fuse: truncate pending writes on O_TRUNC (bsc#1175065).
- fuse: verify attributes (bsc#1175066).
- fuse: verify nlink (bsc#1175067).
- genetlink: remove genl_bind (networking-stable-20_07_17).
- go7007: add sanity checking for endpoints (git-fixes).
- gpu: host1x: debug: Fix multiple channels emitting messages simultaneously (bsc#1111666).
- HID: hiddev: fix mess in hiddev_open() (git-fixes).
- HISI LPC: Re-Add ACPI child enumeration support (bsc#1174658).
- HISI LPC: Stop using MFD APIs (bsc#1174658).
- hv_balloon: Balloon up according to request page number (git-fixes).
- hv_balloon: Use a static page for the balloon_up send buffer (git-fixes).
- hv_netvsc: Allow scatter-gather feature to be tunable (git-fixes).
- hv_netvsc: do not use VF device if link is down (git-fixes).
- hv_netvsc: Fix a warning of suspicious RCU usage (git-fixes).
- hv_netvsc: Fix error handling in netvsc_attach() (git-fixes).
- hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (git-fixes).
- hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (git-fixes).
- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (git-fixes).
- hv_netvsc: flag software created hash value (git-fixes).
- hv_netvsc: Remove 'unlikely' from netvsc_select_queue (git-fixes).
- i2c: rcar: in slave mode, clear NACK earlier (git-fixes).
- i2c: rcar: slave: only send STOP event when we have been addressed (bsc#1111666).
- i40e: Fix crash during removing i40e driver (git-fixes).
- i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (git-fixes).
- ibmveth: Fix use of ibmveth in a bridge (bsc#1174387 ltc#187506).
- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).
- ibmvnic fix NULL tx_pools and rx_tools issue at do_reset (bsc#1175873 ltc#187922).
- include/linux/poison.h: remove obsolete comment (git fixes (poison)).
- Input: psmouse - add a newline when printing 'proto' by sysfs (git-fixes).
- Input: sentelic - fix error return when fsp_reg_write fails (bsc#1111666).
- integrity: remove redundant initialization of variable ret (git-fixes).
- io-mapping: indicate mapping failure (git-fixes).
- ip6_gre: fix null-ptr-deref in ip6gre_init_net() (git-fixes).
- ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() (networking-stable-20_06_28).
- ip6_tunnel: allow not to count pkts on tstats by passing dev as NULL (bsc#1175515).
- ip_tunnel: allow not to count pkts on tstats by setting skb's dev to NULL (bsc#1175515).
- ip_tunnel: Emit events for post-register MTU changes (git-fixes).
- ip_tunnel: fix use-after-free in ip_tunnel_lookup() (networking-stable-20_06_28).
- ip_tunnel: restore binding to ifaces with a large mtu (git-fixes).
- ipv4: fill fl4_icmp_{type,code} in ping_v4_sendmsg (networking-stable-20_07_17).
- ipv4: Silence suspicious RCU usage warning (git-fixes).
- ipv6: fix memory leaks on IPV6_ADDRFORM path (git-fixes).
- ipvlan: fix device features (git-fixes).
- ipvs: allow connection reuse for unconfirmed conntrack (git-fixes).
- ipvs: fix refcount usage for conns in ops mode (git-fixes).
- ipvs: fix the connection sync failed in some cases (bsc#1174699).
- irqchip/gic: Atomically update affinity (bsc#1111666).
- iwlegacy: Check the return value of pcie_capability_read_*() (bsc#1111666).
- jbd2: add the missing unlock_buffer() in the error path of jbd2_write_superblock() (bsc#1175772).
- kabi: genetlink: remove genl_bind (kabi).
- kabi: hide new parameter of ip6_dst_lookup_flow() (bsc#1165629).
- kabi: mask changes to struct ipv6_stub (bsc#1165629).
- kernel/cpu_pm: Fix uninitted local in cpu_pm (git fixes (kernel/pm)).
- kernel-docs: Change Requires on python-Sphinx to earlier than version 3 References: bsc#1166965 From 3 on the internal API that the build system uses was rewritten in an incompatible way. See https://github.com/sphinx-doc/sphinx/issues/7421 and https://bugzilla.suse.com/show_bug.cgi?id=1166965#c16 for some details.
- kernel/relay.c: fix memleak on destroy relay channel (git-fixes).
- kernfs: do not call fsnotify() with name without a parent (bsc#1175770).
- KVM: arm64: Ensure 'params' is initialised when looking up sys register (bsc#1133021).
- KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART (bsc#1133021).
- KVM: arm/arm64: Fix young bit from mmu notifier (bsc#1133021).
- KVM: arm/arm64: vgic: Do not rely on the wrong pending table (bsc#1133021).
- KVM: arm/arm64: vgic-its: Fix restoration of unmapped collections (bsc#1133021).
- KVM: arm: Fix DFSR setting for non-LPAE aarch32 guests (bsc#1133021).
- KVM: arm: Make inject_abt32() inject an external abort instead (bsc#1133021).
- KVM: Change offset in kvm_write_guest_offset_cached to unsigned (bsc#1133021).
- KVM: Check for a bad hva before dropping into the ghc slow path (bsc#1133021).
- KVM: PPC: Book3S PR: Remove uninitialized_var() usage (bsc#1065729).
- l2tp: remove skb_dst_set() from l2tp_xmit_skb() (networking-stable-20_07_17).
- leds: 88pm860x: fix use-after-free on unbind (git-fixes).
- leds: core: Flush scheduled work for system suspend (git-fixes).
- leds: da903x: fix use-after-free on unbind (git-fixes).
- leds: lm3533: fix use-after-free on unbind (git-fixes).
- leds: lm355x: avoid enum conversion warning (git-fixes).
- leds: wm831x-status: fix use-after-free on unbind (git-fixes).
- lib/dim: Fix -Wunused-const-variable warnings (bsc#1174852).
- lib: dimlib: fix help text typos (bsc#1174852).
- lib: logic_pio: Add logic_pio_unregister_range() (bsc#1174658).
- lib: logic_pio: Avoid possible overlap for unregistering regions (bsc#1174658).
- lib: logic_pio: Fix RCU usage (bsc#1174658).
- linux/dim: Add completions count to dim_sample (bsc#1174852).
- linux/dim: Fix overflow in dim calculation (bsc#1174852).
- linux/dim: Move implementation to .c files (bsc#1174852).
- linux/dim: Move logic to dim.h (bsc#1174852).
- linux/dim: Remove 'net' prefix from internal DIM members (bsc#1174852).
- linux/dim: Rename externally exposed macros (bsc#1174852).
- linux/dim: Rename externally used net_dim members (bsc#1174852).
- linux/dim: Rename net_dim_sample() to net_dim_update_sample() (bsc#1174852).
- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).
- llc: make sure applications use ARPHRD_ETHER (networking-stable-20_07_17).
- mac80211: mesh: Free ie data when leaving mesh (git-fixes).
- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).
- MAINTAINERS: add entry for Dynamic Interrupt Moderation (bsc#1174852).
- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (git-fixes).
- md/raid5: Fix Force reconstruct-write io stuck in degraded raid5 (git-fixes).
- media: budget-core: Improve exception handling in budget_register() (git-fixes).
- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).
- media: firewire: Using uninitialized values in node_probe() (git-fixes).
- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).
- media: vpss: clean up resources in init (git-fixes).
- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).
- mfd: dln2: Run event handler loop under spinlock (git-fixes).
- mfd: rk808: Fix RK818 ID template (bsc#1175412).
- mld: fix memory leak in ipv6_mc_destroy_dev() (networking-stable-20_06_28).
- mm: filemap: clear idle flag for writes (bsc#1175769).
- mm/migrate.c: add missing flush_dcache_page for non-mapped page migrate (git fixes (mm/migrate)).
- mm/mmu_notifier: use hlist_add_head_rcu() (git fixes (mm/mmu_notifiers)).
- mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() (git fixes (mm/compaction)).
- mm/rmap.c: do not reuse anon_vma if we just want a copy (git fixes (mm/rmap)).
- mm/shmem.c: cast the type of unmap_start to u64 (git fixes (mm/shmem)).
- mm, thp: fix defrag setting if newline is not used (git fixes (mm/thp)).
- mm/vunmap: add cond_resched() in vunmap_pmd_range (bsc#1175654 ltc#184617).
- mtd: spi-nor: Fix an error code in spi_nor_read_raw() (bsc#1175413).
- mtd: spi-nor: fix kernel-doc for spi_nor::info (bsc#1175414).
- mtd: spi-nor: fix kernel-doc for spi_nor::reg_proto (bsc#1175415).
- mtd: spi-nor: fix silent truncation in spi_nor_read_raw() (bsc#1175416).
- mwifiex: Prevent memory corruption handling keys (git-fixes).
- net: Added pointer check for dst->ops->neigh_lookup in dst_neigh_lookup_skb (git-fixes).
- net: bridge: enfore alignment for ethernet address (networking-stable-20_06_28).
- net: core: reduce recursion limit value (networking-stable-20_06_28).
- net: Do not clear the sock TX queue in sk_set_socket() (networking-stable-20_06_28).
- net: dsa: b53: check for timeout (git-fixes).
- net: dsa: bcm_sf2: Fix node reference count (git-fixes).
- net: ena: Add first_interrupt field to napi struct (bsc#1174852).
- net: ena: add reserved PCI device ID (bsc#1174852).
- net: ena: add support for reporting of packet drops (bsc#1174852).
- net: ena: add support for the rx offset feature (bsc#1174852).
- net: ena: add support for traffic mirroring (bsc#1174852).
- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).
- net: ena: allow setting the hash function without changing the key (bsc#1174852).
- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).
- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).
- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).
- net: ena: change num_queues to num_io_queues for clarity and consistency (bsc#1174852).
- net: ena: changes to RSS hash key allocation (bsc#1174852).
- net: ena: Change WARN_ON expression in ena_del_napi_in_range() (bsc#1174852).
- net: ena: clean up indentation issue (bsc#1174852).
- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).
- net: ena: cosmetic: code reorderings (bsc#1174852).
- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).
- net: ena: cosmetic: fix line break issues (bsc#1174852).
- net: ena: cosmetic: fix spacing issues (bsc#1174852).
- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).
- net: ena: cosmetic: minor code changes (bsc#1174852).
- net: ena: cosmetic: remove unnecessary code (bsc#1174852).
- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).
- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).
- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).
- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).
- net: ena: drop superfluous prototype (bsc#1174852).
- net: ena: enable support of rss hash key and function changes (bsc#1174852).
- net: ena: enable the interrupt_moderation in driver_supported_features (bsc#1174852).
- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).
- net: ena: ethtool: get_channels: use combined only (bsc#1174852).
- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).
- net: ena: ethtool: support set_channels callback (bsc#1174852).
- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).
- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).
- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).
- net: ena: fix incorrect setting of the number of msix vectors (bsc#1174852).
- net: ena: fix incorrect update of intr_delay_resolution (bsc#1174852).
- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).
- net: ena: fix update of interrupt moderation register (bsc#1174852).
- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).
- net: ena: implement XDP drop support (bsc#1174852).
- net: ena: Implement XDP_TX action (bsc#1174852).
- net: ena: make ethtool -l show correct max number of queues (bsc#1174852).
- net: ena: Make missed_tx stat incremental (bsc#1083548).
- net: ena: Make some functions static (bsc#1174852).
- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).
- net: ena: multiple queue creation related cleanups (bsc#1174852).
- net: ena: Prevent reset after device destruction (bsc#1083548).
- net: ena: reduce driver load time (bsc#1174852).
- net: ena: remove all old adaptive rx interrupt moderation code from ena_com (bsc#1174852).
- net: ena: remove code duplication in ena_com_update_nonadaptive_moderation_interval _*() (bsc#1174852).
- net: ena: remove code that does nothing (bsc#1174852).
- net: ena: remove ena_restore_ethtool_params() and relevant fields (bsc#1174852).
- net: ena: remove old adaptive interrupt moderation code from ena_netdev (bsc#1174852).
- net: ena: remove redundant print of number of queues (bsc#1174852).
- net: ena: remove set but not used variable 'hash_key' (bsc#1174852).
- net: ena: remove set but not used variable 'rx_ring' (bsc#1174852).
- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).
- net: ena: Select DIMLIB for ENA_ETHERNET (bsc#1174852).
- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).
- net: ena: support new LLQ acceleration mode (bsc#1174852).
- net: ena: switch to dim algorithm for rx adaptive interrupt moderation (bsc#1174852).
- net: ena: use explicit variable size for clarity (bsc#1174852).
- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).
- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1174852).
- net: ena: xdp: XDP_TX: fix memory leak (bsc#1174852).
- net: ethernet: aquantia: Fix wrong return value (git-fixes).
- net: ethernet: broadcom: have drivers select DIMLIB as needed (bsc#1174852).
- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).
- net: fec: correct the error path for regulator disable in probe (git-fixes).
- netfilter: x_tables: add counters allocation wrapper (git-fixes).
- netfilter: x_tables: cap allocations at 512 mbyte (git-fixes).
- netfilter: x_tables: limit allocation requests for blob rule heads (git-fixes).
- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)
- net: fix memleak in register_netdevice() (networking-stable-20_06_28).
- net: Fix the arp error in some cases (networking-stable-20_06_28).
- net: gre: recompute gre csum for sctp over gre tunnels (git-fixes).
- net: hns3: add autoneg and change speed support for fibre port (bsc#1174070).
- net: hns3: add support for FEC encoding control (bsc#1174070).
- net: hns3: add support for multiple media type (bsc#1174070).
- net: hns3: fix a not link up issue when fibre port supports autoneg (bsc#1174070).
- net: hns3: fix for FEC configuration (bsc#1174070).
- net: hns3: fix port capbility updating issue (bsc#1174070).
- net: hns3: fix port setting handle for fibre port (bsc#1174070).
- net: hns3: fix selftest fail issue for fibre port with autoneg on (bsc#1174070).
- net: hns3: restore the MAC autoneg state after reset (bsc#1174070).
- net: increment xmit_recursion level in dev_direct_xmit() (networking-stable-20_06_28).
- net: ip6_gre: Request headroom in __gre6_xmit() (git-fixes).
- net: lan78xx: add missing endpoint sanity check (git-fixes).
- net: lan78xx: fix transfer-buffer memory leak (git-fixes).
- net: make symbol 'flush_works' static (git-fixes).
- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).
- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).
- net: netsec: Fix signedness bug in netsec_probe() (bsc#1175417).
- net: netsec: initialize tx ring on ndo_open (bsc#1175418).
- net: phy: Check harder for errors in get_phy_id() (bsc#1111666).
- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).
- net: Set fput_needed iff FDPUT_FPUT is set (git-fixes).
- net: socionext: Fix a signedness bug in ave_probe() (bsc#1175419).
- net: socionext: replace napi_alloc_frag with the netdev variant on init (bsc#1175420).
- net: spider_net: Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- net: stmmac: dwmac1000: provide multicast filter fallback (git-fixes).
- net: stmmac: Fix RX packet size > 8191 (git-fixes).
- net: udp: Fix wrong clean up for IS_UDPLITE macro (git-fixes).
- net: update net_dim documentation after rename (bsc#1174852).
- net: usb: ax88179_178a: fix packet alignment padding (networking-stable-20_06_28).
- net: usb: qmi_wwan: add support for Quectel EG95 LTE modem (networking-stable-20_07_17).
- netvsc: unshare skb in VF rx handler (git-fixes).
- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).
- ntb: Fix an error in get link status (git-fixes).
- ntb_netdev: fix sleep time mismatch (git-fixes).
- ntb: ntb_transport: Use scnprintf() for avoiding potential buffer overflow (git-fixes).
- nvme: fix possible deadlock when I/O is blocked (git-fixes).
- nvme-multipath: do not fall back to __nvme_find_path() for non-optimized paths (bsc#1172108).
- nvme-multipath: fix logic for non-optimized paths (bsc#1172108).
- nvme-multipath: round-robin: eliminate 'fallback' variable (bsc#1172108).
- nvme: multipath: round-robin: fix single non-optimized path case (bsc#1172108).
- obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).
- ocfs2: add trimfs dlm lock resource (bsc#1175228).
- ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: change slot number type s16 to u16 (bsc#1175786).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: fix remounting needed after setfacl command (bsc#1173954).
- ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).
- ocfs2: fix value of OCFS2_INVALID_SLOT (bsc#1175767).
- ocfs2: load global_inode_alloc (bsc#1172963).
- ocfs2: load global_inode_alloc (bsc#1172963).
- omapfb: dss: Fix max fclk divider for omap36xx (bsc#1113956)
- openvswitch: Prevent kernel-infoleak in ovs_ct_put_key() (git-fixes).
- PCI/ASPM: Add missing newline in sysfs 'policy' (git-fixes).
- PCI: dwc: Move interrupt acking into the proper callback (bsc#1175666).
- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).
- PCI: Fix 'try' semantics of bus and slot reset (git-fixes).
- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).
- PCI: hv: Fix a timing issue which causes kdump to fail occasionally (bsc#1172871, bsc#1172872, git-fixes).
- PCI: Release IVRS table in AMD ACS quirk (git-fixes).
- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).
- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).
- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).
- pinctrl: single: fix function name in documentation (git-fixes).
- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).
- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).
- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).
- PM / CPU: replace raw_notifier with atomic_notifier (git fixes (kernel/pm)).
- PM / devfreq: rk3399_dmc: Add missing of_node_put() (bsc#1175668).
- PM / devfreq: rk3399_dmc: Disable devfreq-event device when fails.
- PM / devfreq: rk3399_dmc: Fix kernel oops when rockchip,pmu is absent (bsc#1175668).
- PM: sleep: core: Fix the handling of pending runtime resume requests (git-fixes).
- powerpc/64s: Do not init FSCR_DSCR in __init_FSCR() (bsc#1065729).
- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).
- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).
- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).
- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).
- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).
- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).
- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).
- powerpc/perf: Fix missing is_sier_aviable() during build (bsc#1065729).
- powerpc/pseries: Do not initiate shutdown when system is running on UPS (bsc#1175440 ltc#187574).
- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).
- powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU death (bsc#1085030 ltC#165630).
- powerpc/pseries: PCIE PHB reset (bsc#1174689).
- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).
- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).
- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).
- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).
- propagate_one(): mnt_set_mountpoint() needs mount_lock (bsc#1174841).
- pseries: Fix 64 bit logical memory block panic (bsc#1065729).
- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).
- rds: Prevent kernel-infoleak in rds_notify_queue_get() (git-fixes).
- regulator: gpio: Honor regulator-boot-on property (git-fixes).
- Revert 'ALSA: hda: call runtime_allow() for all hda controllers' (bsc#1111666).
- Revert 'drm/amdgpu: Fix NULL dereference in dpm sysfs handlers' (bsc#1113956) * refresh for context changes
- Revert 'ocfs2: avoid inode removal while nfsd is accessing it' This reverts commit 9e096c72476eda333a9998ff464580c00ff59c83.
- Revert 'ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).' This reverts commit 0bf6e248f93736b3f17f399b4a8f64ffa30d371e.
- Revert 'ocfs2: load global_inode_alloc (bsc#1172963).' This reverts commit fc476497b53f967dc615b9cbad9427ba3107b5c4.
- Revert 'scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe' (bsc#1171688 bsc#1174003).
- Revert 'scsi: qla2xxx: Fix crash on qla2x00_mailbox_command' (bsc#1171688 bsc#1174003).
- Revert 'xen/balloon: Fix crash when ballooning on x86 32 bit PAE' (bsc#1065600).
- rocker: fix incorrect error handling in dma_rings_init (networking-stable-20_06_28).
- rpm/check-for-config-changes: Ignore CONFIG_CC_VERSION_TEXT
- rpm/check-for-config-changes: Ignore CONFIG_LD_VERSION
- rpm/constraints.in: Increase memory for kernel-docs References: https://build.opensuse.org/request/show/792664
- rpm: drop execute permissions on source files Sometimes a source file with execute permission appears in upstream repository and makes it into our kernel-source packages. This is caught by OBS build checks and may even result in build failures. Sanitize the source tree by removing execute permissions from all C source and header files.
- rpm/kabi.pl: account for namespace field being moved last Upstream is moving the namespace field in Module.symvers last in order to preserve backwards compatibility with kmod tools (depmod, etc). Fix the kabi.pl script to expect the namespace field last. Since split() ignores trailing empty fields and delimeters, switch to using tr to count how many fields/tabs are in a line. Also, in load_symvers(), pass LIMIT of -1 to split() so it does not strip trailing empty fields, as namespace is an optional field.
- rpm/kernel-binary.spec.in: do not run klp-symbols for configs with no modules Starting with 5.8-rc1, s390x/zfcpdump builds fail because rpm/klp-symbols script does not find .tmp_versions directory. This is missing because s390x/zfcpdump is built without modules (CONFIG_MODULES disabled). As livepatching cannot work without modules, the cleanest solution is setting %klp_symbols to 0 if CONFIG_MODULES is disabled. (We cannot simply add another condition to the place where %klp_symbols is set as it can be already set to 1 from prjconf.)
- rpm/kernel-binary.spec.in: restrict livepatch metapackage to default flavor It has been reported that the kernel-*-livepatch metapackage got erroneously enabled for SLE15-SP3's new -preempt flavor, leading to a unresolvable dependency to a non-existing kernel-livepatch-x.y.z-preempt package. As SLE12 and SLE12-SP1 have run out of livepatching support, the need to build said metapackage for the -xen flavor is gone and the only remaining flavor for which they're still wanted is -default. Restrict the build of the kernel-*-livepatch metapackage to the -default flavor.
- rpm/kernel-obs-build.spec.in: add dm-crypt for building with cryptsetup Co-Authored-By: Adam Spiers <aspiers@suse.com>
- rpm/kernel-obs-build.spec.in: Enable overlayfs Overlayfs is needed for podman or docker builds when no more specific driver can be used (like lvm or btrfs). As the default build fs is ext4 currently, we need overlayfs kernel modules to be available.
- rpm/kernel-source.spec.in: Add obsolete_rebuilds (boo#1172073).
- rpm/mkspec-dtb: add mt76 based dtb package
- rpm/package-descriptions: garbege collection remove old ARM and Xen flavors.
- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).
- rtnetlink: Fix memory(net_device) leak when ->newlink fails (git-fixes).
- s390, dcssblk: kaddr and pfn can be NULL to ->direct_access() (bsc#1174873).
- sched: consistently handle layer3 header accesses in the presence of VLANs (networking-stable-20_07_17).
- sched/deadline: Initialize ->dl_boosted (bsc#1112178).
- scripts/git_sort/git_sort.py: add bluetooth/bluetooth-next.git repository
- scsi: lpfc: Add and rename a whole bunch of function parameter descriptions (bsc#1171558 bsc#1136666).
- scsi: lpfc: Add description for lpfc_release_rpi()'s 'ndlpl param (bsc#1171558 bsc#1136666).
- scsi: lpfc: Add missing misc_deregister() for lpfc_init() (bsc#1171558 bsc#1136666).
- scsi: lpfc: Ensure variable has the same stipulations as code using it (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix a bunch of kerneldoc misdemeanors (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix FCoE speed reporting (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix kerneldoc parameter formatting/misnaming/missing issues (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix LUN loss after cable pull (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix no message shown for lpfc_hdw_queue out of range value (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix oops when unloading driver while running mds diags (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix retry of PRLI when status indicates its unsupported (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix RSCN timeout due to incorrect gidft counter (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix some function parameter descriptions (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix typo in comment for ULP (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix-up around 120 documentation issues (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix-up formatting/docrot where appropriate (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix validation of bsg reply lengths (bsc#1171558 bsc#1136666).
- scsi: lpfc: NVMe remote port devloss_tmo from lldd (bsc#1171558 bsc#1136666 bsc#1173060).
- scsi: lpfc: nvmet: Avoid hang / use-after-free again when destroying targetport (bsc#1171558 bsc#1136666).
- scsi: lpfc: Provide description for lpfc_mem_alloc()'s 'align' param (bsc#1171558 bsc#1136666).
- scsi: lpfc: Quieten some printks (bsc#1171558 bsc#1136666).
- scsi: lpfc: Remove unused variable 'pg_addr' (bsc#1171558 bsc#1136666).
- scsi: lpfc: Update lpfc version to 12.8.0.3 (bsc#1171558 bsc#1136666).
- scsi: lpfc: Use __printf() format notation (bsc#1171558 bsc#1136666).
- scsi: dh: Add Fujitsu device to devinfo and dh lists (bsc#1174026).
- scsi: Fix trivial spelling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Address a set of sparse warnings (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change {RD,WRT}_REG_*() function names from upper case into lower case (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in header files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in source files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix issue with adapter's stopping state (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix login timeout (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix null pointer access during disconnect from subsystem (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix spelling of a variable name (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix warning after FC target reset (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush all sessions on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush I/O on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Initialize 'n' before using it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce noisy debug message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove an unused function (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove a superfluous cast (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: SAN congestion management implementation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use register names instead of register offsets (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for ha->fw_dumped (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1171688 bsc#1174003).
- scsi: smartpqi: add bay identifier (bsc#1172418).
- scsi: smartpqi: add gigabyte controller (bsc#1172418).
- scsi: smartpqi: add id support for SmartRAID 3152-8i (bsc#1172418).
- scsi: smartpqi: add inquiry timeouts (bsc#1172418).
- scsi: smartpqi: add module param for exposure order (bsc#1172418).
- scsi: smartpqi: add module param to hide vsep (bsc#1172418).
- scsi: smartpqi: add new pci ids (bsc#1172418).
- scsi: smartpqi: add pci ids for fiberhome controller (bsc#1172418).
- scsi: smartpqi: add RAID bypass counter (bsc#1172418).
- scsi: smartpqi: add sysfs entries (bsc#1172418).
- scsi: smartpqi: Align driver syntax with oob (bsc#1172418).
- scsi: smartpqi: avoid crashing kernel for controller issues (bsc#1172418).
- scsi: smartpqi: bump version (bsc#1172418).
- scsi: smartpqi: bump version (bsc#1172418).
- scsi: smartpqi: bump version to 1.2.16-010 (bsc#1172418).
- scsi: smartpqi: change TMF timeout from 60 to 30 seconds (bsc#1172418).
- scsi: smartpqi: correct hang when deleting 32 lds (bsc#1172418).
- scsi: smartpqi: correct REGNEWD return status (bsc#1172418).
- scsi: smartpqi: correct syntax issue (bsc#1172418).
- scsi: smartpqi: fix call trace in device discovery (bsc#1172418).
- scsi: smartpqi: fix controller lockup observed during force reboot (bsc#1172418).
- scsi: smartpqi: fix LUN reset when fw bkgnd thread is hung (bsc#1172418).
- scsi: smartpqi: fix problem with unique ID for physical device (bsc#1172418).
- scsi: smartpqi: identify physical devices without issuing INQUIRY (bsc#1172418).
- scsi: smartpqi: properly set both the DMA mask and the coherent DMA mask (bsc#1172418).
- scsi: smartpqi: remove unused manifest constants (bsc#1172418).
- scsi: smartpqi: Reporting unhandled SCSI errors (bsc#1172418).
- scsi: smartpqi: support device deletion via sysfs (bsc#1172418).
- scsi: smartpqi: update copyright (bsc#1172418).
- scsi: smartpqi: update logical volume size after expansion (bsc#1172418).
- scsi: smartpqi: Use scnprintf() for avoiding potential buffer overflow (bsc#1172418).
- scsi: storvsc: Correctly set number of hardware queues for IDE disk (git-fixes).
- scsi: target/iblock: fix WRITE SAME zeroing (bsc#1169790).
- sctp: Do not advertise IPv4 addresses if ipv6only is set on the socket (networking-stable-20_06_28).
- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).
- serial: 8250: change lock order in serial8250_do_startup() (git-fixes).
- serial: pl011: Do not leak amba_ports entry on driver register error (git-fixes).
- serial: pl011: Fix oops on -EPROBE_DEFER (git-fixes).
- Set VIRTIO_CONSOLE=y (bsc#1175667).
- sign also s390x kernel images (bsc#1163524)
- soc: fsl: qbman: allow registering a device link for the portal user (bsc#1174550).
- soc: fsl: qbman_portals: add APIs to retrieve the probing status (bsc#1174550).
- spi: davinci: Remove uninitialized_var() usage (git-fixes).
- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).
- spi: nxp-fspi: Ensure width is respected in spi-mem operations (bsc#1175421).
- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1175422).
- spi: spi-mem: export spi_mem_default_supports_op() (bsc#1175421).
- staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).
- staging: fsl-dpaa2: ethsw: Add missing netdevice check (bsc#1175423).
- staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).
- staging/speakup: fix get_word non-space look-ahead (git-fixes).
- tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT (networking-stable-20_06_28).
- tcp: grow window for OOO packets only for SACK flows (networking-stable-20_06_28).
- tcp: make sure listeners do not initialize congestion-control state (networking-stable-20_07_17).
- tcp: md5: add missing memory barriers in tcp_md5_do_add()/tcp_md5_hash_key() (networking-stable-20_07_17).
- tcp: md5: do not send silly options in SYNCOOKIES (networking-stable-20_07_17).
- tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key() barriers (networking-stable-20_07_17).
- tracepoint: Mark __tracepoint_string's __used (git-fixes).
- tracing: Use trace_sched_process_free() instead of exit() for pid tracing (git-fixes).
- tty: hvc_console, fix crashes on parallel open/close (git-fixes).
- tty: serial: fsl_lpuart: add imx8qxp support (bsc#1175670).
- tty: serial: fsl_lpuart: free IDs allocated by IDA (bsc#1175670).
- USB: cdc-acm: rework notification_buffer resizing (git-fixes).
- USB: gadget: f_tcm: Fix some resource leaks in some error paths (git-fixes).
- USB: host: ohci-exynos: Fix error handling in exynos_ohci_probe() (git-fixes).
- USB: Ignore UAS for JMicron JMS567 ATA/ATAPI Bridge (git-fixes).
- USB: iowarrior: fix up report size handling for some devices (git-fixes).
- usbip: tools: fix module name in man page (git-fixes).
- USB: rename USB quirk to USB_QUIRK_ENDPOINT_IGNORE (git-fixes).
- USB: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).
- USB: serial: cp210x: re-enable auto-RTS on open (git-fixes).
- USB: serial: ftdi_sio: clean up receive processing (git-fixes).
- USB: serial: ftdi_sio: fix break and sysrq handling (git-fixes).
- USB: serial: ftdi_sio: make process-packet buffer unsigned (git-fixes).
- USB: serial: iuu_phoenix: fix led-activity helpers (git-fixes).
- USB: serial: qcserial: add EM7305 QDL product ID (git-fixes).
- USB: xhci: define IDs for various ASMedia host controllers (git-fixes).
- USB: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).
- USB: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).
- USB: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).
- VFS: Check rename_lock in lookup_fast() (bsc#1174734).
- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).
- video: pxafb: Fix the function used to balance a 'dma_alloc_coherent()' call (git-fixes).
- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).
- vlan: consolidate VLAN parsing code and limit max parsing depth (networking-stable-20_07_17).
- vmxnet3: use correct tcp hdr length when packet is encapsulated (bsc#1175199).
- vt_compat_ioctl(): clean up, use compat_ptr() properly (git-fixes).
- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).
- vxlan: Ensure FDB dump is performed under RCU (git-fixes).
- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (bsc#1111666).
- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (bsc#1111666).
- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (bsc#1111666).
- wl1251: fix always return 0 error (git-fixes).
- x86/hyperv: Create and use Hyper-V page definitions (git-fixes).
- x86/hyper-v: Fix overflow bug in fill_gva_list() (git-fixes).
- x86/hyperv: Make hv_vcpu_is_preempted() visible (git-fixes).
- x86/mce/inject: Fix a wrong assignment of i_mce.status (bsc#1112178).
- x86/unwind/orc: Fix ORC for newly forked tasks (bsc#1058115).
- xen/balloon: fix accounting in alloc_xenballooned_pages error path (bsc#1065600).
- xen/balloon: make the balloon wait interruptible (bsc#1065600).
- xfrm: check id proto in validate_tmpl() (git-fixes).
- xfrm: clean up xfrm protocol checks (git-fixes).
- xfrm_user: uncoditionally validate esn replay attribute struct (git-fixes).
- xfs: fix inode allocation block res calculation precedence (git-fixes).
- xfs: fix reflink quota reservation accounting error (git-fixes).
- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).
Patchnames
SUSE-2020-2575,SUSE-SLE-Module-Basesystem-15-SP1-2020-2575,SUSE-SLE-Module-Development-Tools-15-SP1-2020-2575,SUSE-SLE-Module-Legacy-15-SP1-2020-2575,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2575,SUSE-SLE-Product-HA-15-SP1-2020-2575,SUSE-SLE-Product-WE-15-SP1-2020-2575
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup (bsc#1165629).\n- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).\n- CVE-2020-14356: Fixed a null pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213).\n- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).\n- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).\n- CVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).\n- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication Bluetooth might have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access (bsc#1171988).\n- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).\n \nThe following non-security bugs were fixed:\n\n- ACPI: kABI fixes for subsys exports (bsc#1174968).\n- ACPI / LPSS: Resume BYT/CHT I2C controllers from resume_noirq (bsc#1174968).\n- ACPI / LPSS: Use acpi_lpss_* instead of acpi_subsys_* functions for hibernate (bsc#1174968).\n- ACPI: PM: Introduce \u0027poweroff\u0027 callbacks for ACPI PM domain and LPSS (bsc#1174968).\n- ACPI: PM: Simplify and fix PM domain hibernation callbacks (bsc#1174968).\n- af_key: pfkey_dump needs parameter validation (git-fixes).\n- agp/intel: Fix a memory leak on module initialisation failure (git-fixes).\n- ALSA: core: pcm_iec958: fix kernel-doc (bsc#1111666).\n- ALSA: echoaduio: Drop superfluous volatile modifier (bsc#1111666).\n- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (bsc#1111666).\n- ALSA: hda: Add support for Loongson 7A1000 controller (bsc#1111666).\n- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (bsc#1111666).\n- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (bsc#1111666).\n- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (bsc#1111666).\n- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).\n- ALSA: hda: fix snd_hda_codec_cleanup() documentation (bsc#1111666).\n- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (bsc#1111666).\n- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (bsc#1111666).\n- ALSA: hda/realtek: Add model alc298-samsung-headphone (git-fixes).\n- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for Lenovo Carbon X1 8th gen (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for MSI GL63 (bsc#1111666).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex Book (git-fixes).\n- ALSA: hda/realtek - change to suitable link model for ASUS platform (bsc#1111666).\n- ALSA: hda/realtek - Check headset type by unplug and resume (bsc#1111666).\n- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (bsc#1111666).\n- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (bsc#1111666).\n- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (bsc#1111666).\n- ALSA: hda/realtek: Fix add a \u0027ultra_low_power\u0027 function for intel reference board (alc256) (bsc#1111666).\n- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (bsc#1111666).\n- ALSA: hda/realtek - Fixed HP right speaker no sound (bsc#1111666).\n- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (bsc#1111666).\n- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (bsc#1111666).\n- ALSA: hda/realtek - Fix unused variable warning (bsc#1111666).\n- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (bsc#1111666).\n- ALSA: hda - reverse the setting value in the micmute_led_set (bsc#1111666).\n- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).\n- ALSA: pci: delete repeated words in comments (bsc#1111666).\n- ALSA: seq: oss: Serialize ioctls (bsc#1111666).\n- ALSA: usb-audio: Add capture support for Saffire 6 (USB 1.1) (git-fixes).\n- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (bsc#1111666).\n- ALSA: usb-audio: add startech usb audio dock name (bsc#1111666).\n- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (bsc#1111666).\n- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (bsc#1111666).\n- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (bsc#1111666).\n- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (bsc#1111666).\n- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).\n- ALSA: usb-audio: fix spelling mistake \u0027buss\u0027 -\u003e \u0027bus\u0027 (bsc#1111666).\n- ALSA: usb-audio: ignore broken processing/extension unit (git-fixes).\n- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (bsc#1111666).\n- ALSA: usb/line6: remove \u0027defined but not used\u0027 warning (bsc#1111666).\n- arm64: Add MIDR encoding for HiSilicon Taishan CPUs (bsc#1174547).\n- arm64: Add MIDR encoding for NVIDIA CPUs (bsc#1174547).\n- arm64: add sysfs vulnerability show for meltdown (bsc#1174547).\n- arm64: Add sysfs vulnerability show for spectre-v1 (bsc#1174547).\n- arm64: add sysfs vulnerability show for spectre-v2 (bsc#1174547).\n- arm64: add sysfs vulnerability show for speculative store bypass (bsc#1174547). \n- arm64: Advertise mitigation of Spectre-v2, or lack thereof (bsc#1174547). \n- arm64: Always enable spectre-v2 vulnerability detection (bsc#1174547). \n- arm64: Always enable ssb vulnerability detection (bsc#1174547). \n- arm64: backtrace: Do not bother trying to unwind the userspace stack (bsc#1175397).\n- arm64: capabilities: Add NVIDIA Denver CPU to bp_harden list (bsc#1174547).\n- arm64: capabilities: Merge duplicate Cavium erratum entries (bsc#1174547).\n- arm64: capabilities: Merge entries for ARM64_WORKAROUND_CLEAN_CACHE (bsc#1174547). \n- arm64: cpufeature: Enable Qualcomm Falkor/Kryo errata 1003 (bsc#1175398).\n- arm64: Do not mask out PTE_RDONLY in pte_same() (bsc#1175393).\n- arm64: enable generic CPU vulnerabilites support (bsc#1174547). Update config/arm64/default\n- arm64: Ensure VM_WRITE|VM_SHARED ptes are clean by default (bsc#1175394).\n- arm64: errata: Do not define type field twice for arm64_errata entries (bsc#1174547).\n- arm64: errata: Update stale comment (bsc#1174547).\n- arm64: Get rid of __smccc_workaround_1_hvc_* (bsc#1174547).\n- arm64: kpti: Avoid rewriting early page tables when KASLR is enabled (bsc#1174547).\n- arm64: kpti: Update arm64_kernel_use_ng_mappings() when forced on (bsc#1174547).\n- arm64: kpti: Whitelist Cortex-A CPUs that do not implement the CSV3 field (bsc#1174547).\n- arm64: kpti: Whitelist HiSilicon Taishan v110 CPUs (bsc#1174547).\n- arm64: KVM: Avoid setting the upper 32 bits of VTCR_EL2 to 1 (bsc#1133021).\n- arm64: KVM: Guests can skip __install_bp_hardening_cb()s HYP work (bsc#1174547).\n- arm64: KVM: Use SMCCC_ARCH_WORKAROUND_1 for Falkor BP hardening (bsc#1174547). \n- arm64: mm: Fix pte_mkclean, pte_mkdirty semantics (bsc#1175526). \n- arm64: Provide a command line to disable spectre_v2 mitigation (bsc#1174547).\n- arm64: Silence clang warning on mismatched value/register sizes (bsc#1175396).\n- arm64/speculation: Support \u0027mitigations=\u0027 cmdline option (bsc#1174547). \n- arm64: ssbd: explicitly depend on \u003clinux/prctl.h\u003e (bsc#1175399).\n- arm64: ssbs: Do not treat CPUs with SSBS as unaffected by SSB (bsc#1174547).\n- arm64: ssbs: Fix context-switch when SSBS is present on all CPUs (bsc#1175669).\n- arm64/sve: Fix wrong free for task-\u003ethread.sve_state (bsc#1175400).\n- arm64/sve: \u003cuapi/asm/ptrace.h\u003e should not depend on \u0026lt;uapi/linux/prctl.h\u003e (bsc#1175401).\n- arm64: tlbflush: avoid writing RES0 bits (bsc#1175402).\n- arm64: Use firmware to detect CPUs that are not affected by Spectre-v2 (bsc#1174547).\n- ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17 (bsc#1133021). \n- ARM: KVM: invalidate icache on guest exit for Cortex-A15 (bsc#1133021).\n- ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15 (bsc#1133021).\n- ASoC: hda/tegra: Set buffer alignment to 128 bytes (bsc#1111666).\n- ASoC: intel: Fix memleak in sst_media_open (git-fixes).\n- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).\n- AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).\n- AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).\n- AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).\n- ax88172a: fix ax88172a_unbind() failures (git-fixes).\n- b43: Remove uninitialized_var() usage (git-fixes).\n- bcache: allocate meta data pages as compound pages (bsc#1172873).\n- block: check queue\u0027s limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).\n- block: Fix use-after-free in blkdev_get() (bsc#1174843).\n- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).\n- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (bsc#1111666).\n- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (bsc#1111666).\n- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (bsc#1111666).\n- bonding: fix active-backup failover for current ARP slave (bsc#1174771).\n- bonding: fix a potential double-unregister (git-fixes).\n- bonding: show saner speed for broadcast mode (git-fixes).\n- bpf: Fix map leak in HASH_OF_MAPS map (git-fixes).\n- brcmfmac: keep SDIO watchdog running when console_interval is non-zero (bsc#1111666).\n- brcmfmac: set state of hanger slot to FREE when flushing PSQ (bsc#1111666).\n- brcmfmac: To fix Bss Info flag definition Bug (bsc#1111666).\n- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).\n- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).\n- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).\n- btrfs: fix block group leak when removing fails (bsc#1175149).\n- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).\n- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).\n- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).\n- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).\n- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).\n- btrfs: fix memory leaks after failure to lookup checksums during inode logging (bsc#1175550).\n- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).\n- btrfs: fix race between block group removal and block group creation (bsc#1175149).\n- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).\n- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).\n- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).\n- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).\n- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).\n- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).\n- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).\n- btrfs: Open code btrfs_write_and_wait_marked_extents (bsc#1175149).\n- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).\n- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).\n- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).\n- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).\n- btrfs: Rename and export clear_btree_io_tree (bsc#1175149).\n- btrfs: treat RWF_{,D}SYNC writes as sync for CRCs (bsc#1175493).\n- bus: hisi_lpc: Add .remove method to avoid driver unbind crash (bsc#1174658).\n- bus: hisi_lpc: Do not fail probe for unrecognised child devices (bsc#1174658).\n- bus: hisi_lpc: Unregister logical PIO range to avoid potential use-after-free (bsc#1174658).\n- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).\n- cfg80211: check vendor command doit pointer before use (git-fixes).\n- char: virtio: Select VIRTIO from VIRTIO_CONSOLE (bsc#1175667).\n- cifs: document and cleanup dfs mount (bsc#1144333 bsc#1172428).\n- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1144333 bsc#1172428).\n- cifs: fix double free error on share and prefix (bsc#1144333 bsc#1172428).\n- cifs: handle empty list of targets in cifs_reconnect() (bsc#1144333 bsc#1172428).\n- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1144333 bsc#1172428).\n- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1144333 bsc#1172428).\n- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1144333 bsc#1172428).\n- cifs: reduce number of referral requests in DFS link lookups (bsc#1144333 bsc#1172428).\n- cifs: rename reconn_inval_dfs_target() (bsc#1144333 bsc#1172428).\n- clk: at91: clk-generated: check best_rate against ranges (bsc#1111666).\n- clk: clk-atlas6: fix return value check in atlas6_clk_init() (bsc#1111666).\n- clk: iproc: round clock rate to the closest (bsc#1111666).\n- clk: spear: Remove uninitialized_var() usage (git-fixes).\n- clk: st: Remove uninitialized_var() usage (git-fixes).\n- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1174549\n- console: newport_con: fix an issue about leak related system resources (git-fixes).\n- constrants: fix malformed XML Closing tag of an element is \u0027\u003c/foo\u003e\u0027, not \u0027\u003cfoo/\u003e\u0027. Fixes: 8b37de2eb835 (\u0027rpm/constraints.in: Increase memory for kernel-docs\u0027)\n- Created new preempt kernel flavor (jsc#SLE-11309) Configs are cloned from the respective $arch/default configs. All changed configs appart from CONFIG_PREEMPT-\u003ey are a result of dependencies, namely many lock/unlock primitives are no longer inlined in the preempt kernel. TREE_RCU has been also changed to PREEMPT_RCU which is the default implementation for PREEMPT kernel.\n- crypto: ccp - Fix use of merged scatterlists (git-fixes).\n- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).\n- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).\n- crypto: rockchip - fix scatterlist nents error (git-fixes).\n- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).\n- crypto: talitos - check AES key size (git-fixes).\n- crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK (git-fixes).\n- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- dev: Defer free of skbs in flush_backlog (git-fixes).\n- device property: Fix the secondary firmware node handling in set_primary_fwnode() (git-fixes).\n- devres: keep both device name and resource name in pretty name (git-fixes).\n- dlm: Fix kobject memleak (bsc#1175768).\n- dlm: remove BUG() before panic() (bsc#1174844).\n- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).\n- Documentation/networking: Add net DIM documentation (bsc#1174852).\n- dpaa2-eth: Fix passing zero to \u0027PTR_ERR\u0027 warning (bsc#1175403).\n- dpaa2-eth: free already allocated channels on probe defer (bsc#1175404).\n- dpaa2-eth: prevent array underflow in update_cls_rule() (bsc#1175405).\n- dpaa_eth: add dropped frames to percpu ethtool stats (bsc#1174550).\n- dpaa_eth: add newline in dev_err() msg (bsc#1174550).\n- dpaa_eth: avoid timestamp read on error paths (bsc#1175406).\n- dpaa_eth: change DMA device (bsc#1174550).\n- dpaa_eth: cleanup skb_to_contig_fd() (bsc#1174550).\n- dpaa_eth: defer probing after qbman (bsc#1174550).\n- dpaa_eth: extend delays in ndo_stop (bsc#1174550).\n- dpaa_eth: fix DMA mapping leak (bsc#1174550).\n- dpaa_eth: Fix one possible memleak in dpaa_eth_probe (bsc#1174550).\n- dpaa_eth: FMan erratum A050385 workaround (bsc#1174550).\n- dpaa_eth: perform DMA unmapping before read (bsc#1175407).\n- dpaa_eth: register a device link for the qman portal used (bsc#1174550).\n- dpaa_eth: remove netdev_err() for user errors (bsc#1174550).\n- dpaa_eth: remove redundant code (bsc#1174550).\n- dpaa_eth: simplify variables used in dpaa_cleanup_tx_fd() (bsc#1174550).\n- dpaa_eth: use a page to store the SGT (bsc#1174550).\n- dpaa_eth: use fd information in dpaa_cleanup_tx_fd() (bsc#1174550).\n- dpaa_eth: use only one buffer pool per interface (bsc#1174550).\n- dpaa_eth: use page backed rx buffers (bsc#1174550).\n- driver core: Avoid binding drivers to dead devices (git-fixes).\n- Drivers: hv: balloon: Remove dependencies on guest page size (git-fixes).\n- Drivers: hv: vmbus: Fix virt_to_hvpfn() for X86_PAE (git-fixes).\n- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127, bsc#1175128).\n- Drivers: hv: vmbus: Remove the undesired put_cpu_ptr() in hv_synic_cleanup() (git-fixes).\n- drivers/perf: hisi: Fix typo in events attribute array (bsc#1175408).\n- drivers/perf: hisi: Fixup one DDRC PMU register offset (bsc#1175410).\n- drivers/perf: hisi: Fix wrong value for all counters enable (bsc#1175409).\n- drm: Added orientation quirk for ASUS tablet model T103HAF (bsc#1111666).\n- drm/amd/display: fix pow() crashing when given base 0 (git-fixes).\n- drm/amdgpu: avoid dereferencing a NULL pointer (bsc#1111666).\n- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (bsc#1111666).\n- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (bsc#1113956) \t* refresh for context changes\n- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).\n- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1113956)\n- drm/arm: fix unintentional integer overflow on left shift (git-fixes).\n- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1113956) \t* refreshed for context changes\n- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).\n- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1113956) \t* move drm_mipi_dbi.c -\u003e tinydrm/mipi-drm.c \t* refresh for context changes\n- drm/debugfs: fix plain echo to connector \u0027force\u0027 attribute (bsc#1111666).\n- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).\n- drm/etnaviv: fix ref count leak via pm_runtime_get_sync (bsc#1111666).\n- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (bsc#1112178) \t* updated names of get/put functions\n- drm: hold gem reference until object is no longer accessed (bsc#1113956)\n- drm/imx: fix use after free (git-fixes).\n- drm/imx: imx-ldb: Disable both channels for split mode in enc-\u003edisable() (git-fixes).\n- drm/imx: tve: fix regulator_disable error path (git-fixes).\n- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).\n- drm/msm/adreno: fix updating ring fence (git-fixes).\n- drm/msm: ratelimit crtc event overflow error (bsc#1111666).\n- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).\n- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).\n- drm/nouveau: fix multiple instances of reference count leaks (bsc#1111666).\n- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).\n- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).\n- drm/radeon: disable AGP by default (bsc#1111666).\n- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).\n- drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync (bsc#1111666).\n- drm/rockchip: fix VOP_WIN_GET macro (bsc#1175411).\n- drm/tilcdc: fix leak \u0026 null ref in panel_connector_get_modes (bsc#1111666).\n- drm/ttm/nouveau: do not call tt destroy callback on alloc failure (bsc#1175232).\n- drm/vmwgfx: Fix two list_for_each loop exit tests (bsc#1111666).\n- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (bsc#1111666).\n- drm/xen-front: Fix misused IS_ERR_OR_NULL checks (bsc#1065600).\n- efi/memreserve: deal with memreserve entries in unmapped memory (bsc#1174685).\n- ext4: check journal inode extents more carefully (bsc#1173485).\n- ext4: do not allow overlapping system zones (bsc#1173485).\n- ext4: fix checking of directory entry validity for inline directories (bsc#1175771).\n- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1174840).\n- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).\n- fat: do not allow to mount if the FAT length == 0 (bsc#1174845).\n- fbdev: Detect integer underflow at \u0027struct fbcon_ops\u0027-\u003eclear_margins. (bsc#1112178) \t* move files drivers/video/fbdev/core -\u003e drivers/video/console \t* refresh for context changes\n- firmware: google: check if size is valid when decoding VPD data (git-fixes).\n- firmware: google: increment VPD key_len properly (git-fixes).\n- fpga: dfl: fix bug in port reset handshake (git-fixes).\n- fsl/fman: add API to get the device behind a fman port (bsc#1174550).\n- fsl/fman: check dereferencing null pointer (git-fixes).\n- fsl/fman: detect FMan erratum A050385 (bsc#1174550).\n- fsl/fman: do not touch liodn base regs reserved on non-PAMU SoCs (bsc#1174550).\n- fsl/fman: fix dereference null return value (git-fixes).\n- fsl/fman: fix eth hash table allocation (git-fixes).\n- fsl/fman: fix unreachable code (git-fixes).\n- fsl/fman: remove unused struct member (bsc#1174550).\n- fsl/fman: use 32-bit unsigned integer (git-fixes).\n- fuse: fix memleak in cuse_channel_open (bsc#1174926).\n- fuse: fix missing unlock_page in fuse_writepage() (bsc#1174904).\n- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175062).\n- fuse: fix weird page warning (bsc#1175063).\n- fuse: flush dirty data/metadata before non-truncate setattr (bsc#1175064).\n- fuse: truncate pending writes on O_TRUNC (bsc#1175065).\n- fuse: verify attributes (bsc#1175066).\n- fuse: verify nlink (bsc#1175067).\n- genetlink: remove genl_bind (networking-stable-20_07_17).\n- go7007: add sanity checking for endpoints (git-fixes).\n- gpu: host1x: debug: Fix multiple channels emitting messages simultaneously (bsc#1111666).\n- HID: hiddev: fix mess in hiddev_open() (git-fixes).\n- HISI LPC: Re-Add ACPI child enumeration support (bsc#1174658).\n- HISI LPC: Stop using MFD APIs (bsc#1174658).\n- hv_balloon: Balloon up according to request page number (git-fixes).\n- hv_balloon: Use a static page for the balloon_up send buffer (git-fixes).\n- hv_netvsc: Allow scatter-gather feature to be tunable (git-fixes).\n- hv_netvsc: do not use VF device if link is down (git-fixes).\n- hv_netvsc: Fix a warning of suspicious RCU usage (git-fixes).\n- hv_netvsc: Fix error handling in netvsc_attach() (git-fixes).\n- hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (git-fixes).\n- hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (git-fixes).\n- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (git-fixes).\n- hv_netvsc: flag software created hash value (git-fixes).\n- hv_netvsc: Remove \u0027unlikely\u0027 from netvsc_select_queue (git-fixes).\n- i2c: rcar: in slave mode, clear NACK earlier (git-fixes).\n- i2c: rcar: slave: only send STOP event when we have been addressed (bsc#1111666).\n- i40e: Fix crash during removing i40e driver (git-fixes).\n- i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (git-fixes).\n- ibmveth: Fix use of ibmveth in a bridge (bsc#1174387 ltc#187506).\n- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).\n- ibmvnic fix NULL tx_pools and rx_tools issue at do_reset (bsc#1175873 ltc#187922).\n- include/linux/poison.h: remove obsolete comment (git fixes (poison)).\n- Input: psmouse - add a newline when printing \u0027proto\u0027 by sysfs (git-fixes).\n- Input: sentelic - fix error return when fsp_reg_write fails (bsc#1111666).\n- integrity: remove redundant initialization of variable ret (git-fixes).\n- io-mapping: indicate mapping failure (git-fixes).\n- ip6_gre: fix null-ptr-deref in ip6gre_init_net() (git-fixes).\n- ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() (networking-stable-20_06_28).\n- ip6_tunnel: allow not to count pkts on tstats by passing dev as NULL (bsc#1175515).\n- ip_tunnel: allow not to count pkts on tstats by setting skb\u0027s dev to NULL (bsc#1175515).\n- ip_tunnel: Emit events for post-register MTU changes (git-fixes).\n- ip_tunnel: fix use-after-free in ip_tunnel_lookup() (networking-stable-20_06_28).\n- ip_tunnel: restore binding to ifaces with a large mtu (git-fixes).\n- ipv4: fill fl4_icmp_{type,code} in ping_v4_sendmsg (networking-stable-20_07_17).\n- ipv4: Silence suspicious RCU usage warning (git-fixes).\n- ipv6: fix memory leaks on IPV6_ADDRFORM path (git-fixes).\n- ipvlan: fix device features (git-fixes).\n- ipvs: allow connection reuse for unconfirmed conntrack (git-fixes).\n- ipvs: fix refcount usage for conns in ops mode (git-fixes).\n- ipvs: fix the connection sync failed in some cases (bsc#1174699).\n- irqchip/gic: Atomically update affinity (bsc#1111666).\n- iwlegacy: Check the return value of pcie_capability_read_*() (bsc#1111666).\n- jbd2: add the missing unlock_buffer() in the error path of jbd2_write_superblock() (bsc#1175772).\n- kabi: genetlink: remove genl_bind (kabi).\n- kabi: hide new parameter of ip6_dst_lookup_flow() (bsc#1165629).\n- kabi: mask changes to struct ipv6_stub (bsc#1165629).\n- kernel/cpu_pm: Fix uninitted local in cpu_pm (git fixes (kernel/pm)).\n- kernel-docs: Change Requires on python-Sphinx to earlier than version 3 References: bsc#1166965 From 3 on the internal API that the build system uses was rewritten in an incompatible way. See https://github.com/sphinx-doc/sphinx/issues/7421 and https://bugzilla.suse.com/show_bug.cgi?id=1166965#c16 for some details.\n- kernel/relay.c: fix memleak on destroy relay channel (git-fixes).\n- kernfs: do not call fsnotify() with name without a parent (bsc#1175770).\n- KVM: arm64: Ensure \u0027params\u0027 is initialised when looking up sys register (bsc#1133021).\n- KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART (bsc#1133021).\n- KVM: arm/arm64: Fix young bit from mmu notifier (bsc#1133021).\n- KVM: arm/arm64: vgic: Do not rely on the wrong pending table (bsc#1133021).\n- KVM: arm/arm64: vgic-its: Fix restoration of unmapped collections (bsc#1133021).\n- KVM: arm: Fix DFSR setting for non-LPAE aarch32 guests (bsc#1133021).\n- KVM: arm: Make inject_abt32() inject an external abort instead (bsc#1133021).\n- KVM: Change offset in kvm_write_guest_offset_cached to unsigned (bsc#1133021).\n- KVM: Check for a bad hva before dropping into the ghc slow path (bsc#1133021).\n- KVM: PPC: Book3S PR: Remove uninitialized_var() usage (bsc#1065729).\n- l2tp: remove skb_dst_set() from l2tp_xmit_skb() (networking-stable-20_07_17).\n- leds: 88pm860x: fix use-after-free on unbind (git-fixes).\n- leds: core: Flush scheduled work for system suspend (git-fixes).\n- leds: da903x: fix use-after-free on unbind (git-fixes).\n- leds: lm3533: fix use-after-free on unbind (git-fixes).\n- leds: lm355x: avoid enum conversion warning (git-fixes).\n- leds: wm831x-status: fix use-after-free on unbind (git-fixes).\n- lib/dim: Fix -Wunused-const-variable warnings (bsc#1174852).\n- lib: dimlib: fix help text typos (bsc#1174852).\n- lib: logic_pio: Add logic_pio_unregister_range() (bsc#1174658).\n- lib: logic_pio: Avoid possible overlap for unregistering regions (bsc#1174658).\n- lib: logic_pio: Fix RCU usage (bsc#1174658).\n- linux/dim: Add completions count to dim_sample (bsc#1174852).\n- linux/dim: Fix overflow in dim calculation (bsc#1174852).\n- linux/dim: Move implementation to .c files (bsc#1174852).\n- linux/dim: Move logic to dim.h (bsc#1174852).\n- linux/dim: Remove \u0027net\u0027 prefix from internal DIM members (bsc#1174852).\n- linux/dim: Rename externally exposed macros (bsc#1174852).\n- linux/dim: Rename externally used net_dim members (bsc#1174852).\n- linux/dim: Rename net_dim_sample() to net_dim_update_sample() (bsc#1174852).\n- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).\n- llc: make sure applications use ARPHRD_ETHER (networking-stable-20_07_17).\n- mac80211: mesh: Free ie data when leaving mesh (git-fixes).\n- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).\n- MAINTAINERS: add entry for Dynamic Interrupt Moderation (bsc#1174852).\n- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (git-fixes).\n- md/raid5: Fix Force reconstruct-write io stuck in degraded raid5 (git-fixes).\n- media: budget-core: Improve exception handling in budget_register() (git-fixes).\n- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).\n- media: firewire: Using uninitialized values in node_probe() (git-fixes).\n- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).\n- media: vpss: clean up resources in init (git-fixes).\n- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).\n- mfd: dln2: Run event handler loop under spinlock (git-fixes).\n- mfd: rk808: Fix RK818 ID template (bsc#1175412).\n- mld: fix memory leak in ipv6_mc_destroy_dev() (networking-stable-20_06_28).\n- mm: filemap: clear idle flag for writes (bsc#1175769).\n- mm/migrate.c: add missing flush_dcache_page for non-mapped page migrate (git fixes (mm/migrate)).\n- mm/mmu_notifier: use hlist_add_head_rcu() (git fixes (mm/mmu_notifiers)).\n- mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() (git fixes (mm/compaction)).\n- mm/rmap.c: do not reuse anon_vma if we just want a copy (git fixes (mm/rmap)).\n- mm/shmem.c: cast the type of unmap_start to u64 (git fixes (mm/shmem)).\n- mm, thp: fix defrag setting if newline is not used (git fixes (mm/thp)).\n- mm/vunmap: add cond_resched() in vunmap_pmd_range (bsc#1175654 ltc#184617).\n- mtd: spi-nor: Fix an error code in spi_nor_read_raw() (bsc#1175413).\n- mtd: spi-nor: fix kernel-doc for spi_nor::info (bsc#1175414).\n- mtd: spi-nor: fix kernel-doc for spi_nor::reg_proto (bsc#1175415).\n- mtd: spi-nor: fix silent truncation in spi_nor_read_raw() (bsc#1175416).\n- mwifiex: Prevent memory corruption handling keys (git-fixes).\n- net: Added pointer check for dst-\u003eops-\u003eneigh_lookup in dst_neigh_lookup_skb (git-fixes).\n- net: bridge: enfore alignment for ethernet address (networking-stable-20_06_28).\n- net: core: reduce recursion limit value (networking-stable-20_06_28).\n- net: Do not clear the sock TX queue in sk_set_socket() (networking-stable-20_06_28).\n- net: dsa: b53: check for timeout (git-fixes).\n- net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n- net: ena: Add first_interrupt field to napi struct (bsc#1174852).\n- net: ena: add reserved PCI device ID (bsc#1174852).\n- net: ena: add support for reporting of packet drops (bsc#1174852).\n- net: ena: add support for the rx offset feature (bsc#1174852).\n- net: ena: add support for traffic mirroring (bsc#1174852).\n- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).\n- net: ena: allow setting the hash function without changing the key (bsc#1174852).\n- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).\n- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).\n- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).\n- net: ena: change num_queues to num_io_queues for clarity and consistency (bsc#1174852).\n- net: ena: changes to RSS hash key allocation (bsc#1174852).\n- net: ena: Change WARN_ON expression in ena_del_napi_in_range() (bsc#1174852).\n- net: ena: clean up indentation issue (bsc#1174852).\n- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).\n- net: ena: cosmetic: code reorderings (bsc#1174852).\n- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).\n- net: ena: cosmetic: fix line break issues (bsc#1174852).\n- net: ena: cosmetic: fix spacing issues (bsc#1174852).\n- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).\n- net: ena: cosmetic: minor code changes (bsc#1174852).\n- net: ena: cosmetic: remove unnecessary code (bsc#1174852).\n- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).\n- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).\n- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).\n- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).\n- net: ena: drop superfluous prototype (bsc#1174852).\n- net: ena: enable support of rss hash key and function changes (bsc#1174852).\n- net: ena: enable the interrupt_moderation in driver_supported_features (bsc#1174852).\n- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).\n- net: ena: ethtool: get_channels: use combined only (bsc#1174852).\n- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).\n- net: ena: ethtool: support set_channels callback (bsc#1174852).\n- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).\n- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).\n- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).\n- net: ena: fix incorrect setting of the number of msix vectors (bsc#1174852).\n- net: ena: fix incorrect update of intr_delay_resolution (bsc#1174852).\n- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).\n- net: ena: fix update of interrupt moderation register (bsc#1174852).\n- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).\n- net: ena: implement XDP drop support (bsc#1174852).\n- net: ena: Implement XDP_TX action (bsc#1174852).\n- net: ena: make ethtool -l show correct max number of queues (bsc#1174852).\n- net: ena: Make missed_tx stat incremental (bsc#1083548).\n- net: ena: Make some functions static (bsc#1174852).\n- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).\n- net: ena: multiple queue creation related cleanups (bsc#1174852).\n- net: ena: Prevent reset after device destruction (bsc#1083548).\n- net: ena: reduce driver load time (bsc#1174852).\n- net: ena: remove all old adaptive rx interrupt moderation code from ena_com (bsc#1174852).\n- net: ena: remove code duplication in ena_com_update_nonadaptive_moderation_interval _*() (bsc#1174852).\n- net: ena: remove code that does nothing (bsc#1174852).\n- net: ena: remove ena_restore_ethtool_params() and relevant fields (bsc#1174852).\n- net: ena: remove old adaptive interrupt moderation code from ena_netdev (bsc#1174852).\n- net: ena: remove redundant print of number of queues (bsc#1174852).\n- net: ena: remove set but not used variable \u0027hash_key\u0027 (bsc#1174852).\n- net: ena: remove set but not used variable \u0027rx_ring\u0027 (bsc#1174852).\n- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).\n- net: ena: Select DIMLIB for ENA_ETHERNET (bsc#1174852).\n- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).\n- net: ena: support new LLQ acceleration mode (bsc#1174852).\n- net: ena: switch to dim algorithm for rx adaptive interrupt moderation (bsc#1174852).\n- net: ena: use explicit variable size for clarity (bsc#1174852).\n- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).\n- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1174852).\n- net: ena: xdp: XDP_TX: fix memory leak (bsc#1174852).\n- net: ethernet: aquantia: Fix wrong return value (git-fixes).\n- net: ethernet: broadcom: have drivers select DIMLIB as needed (bsc#1174852).\n- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).\n- net: fec: correct the error path for regulator disable in probe (git-fixes).\n- netfilter: x_tables: add counters allocation wrapper (git-fixes).\n- netfilter: x_tables: cap allocations at 512 mbyte (git-fixes).\n- netfilter: x_tables: limit allocation requests for blob rule heads (git-fixes).\n- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)\n- net: fix memleak in register_netdevice() (networking-stable-20_06_28).\n- net: Fix the arp error in some cases (networking-stable-20_06_28).\n- net: gre: recompute gre csum for sctp over gre tunnels (git-fixes).\n- net: hns3: add autoneg and change speed support for fibre port (bsc#1174070).\n- net: hns3: add support for FEC encoding control (bsc#1174070).\n- net: hns3: add support for multiple media type (bsc#1174070).\n- net: hns3: fix a not link up issue when fibre port supports autoneg (bsc#1174070).\n- net: hns3: fix for FEC configuration (bsc#1174070).\n- net: hns3: fix port capbility updating issue (bsc#1174070).\n- net: hns3: fix port setting handle for fibre port (bsc#1174070).\n- net: hns3: fix selftest fail issue for fibre port with autoneg on (bsc#1174070).\n- net: hns3: restore the MAC autoneg state after reset (bsc#1174070).\n- net: increment xmit_recursion level in dev_direct_xmit() (networking-stable-20_06_28).\n- net: ip6_gre: Request headroom in __gre6_xmit() (git-fixes).\n- net: lan78xx: add missing endpoint sanity check (git-fixes).\n- net: lan78xx: fix transfer-buffer memory leak (git-fixes).\n- net: make symbol \u0027flush_works\u0027 static (git-fixes).\n- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).\n- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).\n- net: netsec: Fix signedness bug in netsec_probe() (bsc#1175417).\n- net: netsec: initialize tx ring on ndo_open (bsc#1175418).\n- net: phy: Check harder for errors in get_phy_id() (bsc#1111666).\n- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).\n- net: Set fput_needed iff FDPUT_FPUT is set (git-fixes).\n- net: socionext: Fix a signedness bug in ave_probe() (bsc#1175419).\n- net: socionext: replace napi_alloc_frag with the netdev variant on init (bsc#1175420).\n- net: spider_net: Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- net: stmmac: dwmac1000: provide multicast filter fallback (git-fixes).\n- net: stmmac: Fix RX packet size \u003e 8191 (git-fixes).\n- net: udp: Fix wrong clean up for IS_UDPLITE macro (git-fixes).\n- net: update net_dim documentation after rename (bsc#1174852).\n- net: usb: ax88179_178a: fix packet alignment padding (networking-stable-20_06_28).\n- net: usb: qmi_wwan: add support for Quectel EG95 LTE modem (networking-stable-20_07_17).\n- netvsc: unshare skb in VF rx handler (git-fixes).\n- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).\n- ntb: Fix an error in get link status (git-fixes).\n- ntb_netdev: fix sleep time mismatch (git-fixes).\n- ntb: ntb_transport: Use scnprintf() for avoiding potential buffer overflow (git-fixes).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme-multipath: do not fall back to __nvme_find_path() for non-optimized paths (bsc#1172108).\n- nvme-multipath: fix logic for non-optimized paths (bsc#1172108).\n- nvme-multipath: round-robin: eliminate \u0027fallback\u0027 variable (bsc#1172108).\n- nvme: multipath: round-robin: fix single non-optimized path case (bsc#1172108).\n- obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).\n- ocfs2: add trimfs dlm lock resource (bsc#1175228).\n- ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).\n- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n- ocfs2: change slot number type s16 to u16 (bsc#1175786).\n- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n- ocfs2: fix remounting needed after setfacl command (bsc#1173954).\n- ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).\n- ocfs2: fix value of OCFS2_INVALID_SLOT (bsc#1175767).\n- ocfs2: load global_inode_alloc (bsc#1172963).\n- ocfs2: load global_inode_alloc (bsc#1172963).\n- omapfb: dss: Fix max fclk divider for omap36xx (bsc#1113956)\n- openvswitch: Prevent kernel-infoleak in ovs_ct_put_key() (git-fixes).\n- PCI/ASPM: Add missing newline in sysfs \u0027policy\u0027 (git-fixes).\n- PCI: dwc: Move interrupt acking into the proper callback (bsc#1175666).\n- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).\n- PCI: Fix \u0027try\u0027 semantics of bus and slot reset (git-fixes).\n- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).\n- PCI: hv: Fix a timing issue which causes kdump to fail occasionally (bsc#1172871, bsc#1172872, git-fixes).\n- PCI: Release IVRS table in AMD ACS quirk (git-fixes).\n- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).\n- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).\n- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).\n- pinctrl: single: fix function name in documentation (git-fixes).\n- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).\n- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).\n- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).\n- PM / CPU: replace raw_notifier with atomic_notifier (git fixes (kernel/pm)).\n- PM / devfreq: rk3399_dmc: Add missing of_node_put() (bsc#1175668).\n- PM / devfreq: rk3399_dmc: Disable devfreq-event device when fails.\n- PM / devfreq: rk3399_dmc: Fix kernel oops when rockchip,pmu is absent (bsc#1175668).\n- PM: sleep: core: Fix the handling of pending runtime resume requests (git-fixes).\n- powerpc/64s: Do not init FSCR_DSCR in __init_FSCR() (bsc#1065729).\n- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).\n- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).\n- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).\n- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).\n- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).\n- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).\n- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).\n- powerpc/perf: Fix missing is_sier_aviable() during build (bsc#1065729).\n- powerpc/pseries: Do not initiate shutdown when system is running on UPS (bsc#1175440 ltc#187574).\n- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).\n- powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU death (bsc#1085030 ltC#165630).\n- powerpc/pseries: PCIE PHB reset (bsc#1174689).\n- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).\n- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).\n- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).\n- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).\n- propagate_one(): mnt_set_mountpoint() needs mount_lock (bsc#1174841).\n- pseries: Fix 64 bit logical memory block panic (bsc#1065729).\n- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).\n- rds: Prevent kernel-infoleak in rds_notify_queue_get() (git-fixes).\n- regulator: gpio: Honor regulator-boot-on property (git-fixes).\n- Revert \u0027ALSA: hda: call runtime_allow() for all hda controllers\u0027 (bsc#1111666).\n- Revert \u0027drm/amdgpu: Fix NULL dereference in dpm sysfs handlers\u0027 (bsc#1113956) \t* refresh for context changes\n- Revert \u0027ocfs2: avoid inode removal while nfsd is accessing it\u0027 This reverts commit 9e096c72476eda333a9998ff464580c00ff59c83.\n- Revert \u0027ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\u0027 This reverts commit 0bf6e248f93736b3f17f399b4a8f64ffa30d371e.\n- Revert \u0027ocfs2: load global_inode_alloc (bsc#1172963).\u0027 This reverts commit fc476497b53f967dc615b9cbad9427ba3107b5c4.\n- Revert \u0027scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe\u0027 (bsc#1171688 bsc#1174003).\n- Revert \u0027scsi: qla2xxx: Fix crash on qla2x00_mailbox_command\u0027 (bsc#1171688 bsc#1174003).\n- Revert \u0027xen/balloon: Fix crash when ballooning on x86 32 bit PAE\u0027 (bsc#1065600).\n- rocker: fix incorrect error handling in dma_rings_init (networking-stable-20_06_28).\n- rpm/check-for-config-changes: Ignore CONFIG_CC_VERSION_TEXT\n- rpm/check-for-config-changes: Ignore CONFIG_LD_VERSION\n- rpm/constraints.in: Increase memory for kernel-docs References: https://build.opensuse.org/request/show/792664\n- rpm: drop execute permissions on source files Sometimes a source file with execute permission appears in upstream repository and makes it into our kernel-source packages. This is caught by OBS build checks and may even result in build failures. Sanitize the source tree by removing execute permissions from all C source and header files.\n- rpm/kabi.pl: account for namespace field being moved last Upstream is moving the namespace field in Module.symvers last in order to preserve backwards compatibility with kmod tools (depmod, etc). Fix the kabi.pl script to expect the namespace field last. Since split() ignores trailing empty fields and delimeters, switch to using tr to count how many fields/tabs are in a line. Also, in load_symvers(), pass LIMIT of -1 to split() so it does not strip trailing empty fields, as namespace is an optional field.\n- rpm/kernel-binary.spec.in: do not run klp-symbols for configs with no modules Starting with 5.8-rc1, s390x/zfcpdump builds fail because rpm/klp-symbols script does not find .tmp_versions directory. This is missing because s390x/zfcpdump is built without modules (CONFIG_MODULES disabled). As livepatching cannot work without modules, the cleanest solution is setting %klp_symbols to 0 if CONFIG_MODULES is disabled. (We cannot simply add another condition to the place where %klp_symbols is set as it can be already set to 1 from prjconf.)\n- rpm/kernel-binary.spec.in: restrict livepatch metapackage to default flavor It has been reported that the kernel-*-livepatch metapackage got erroneously enabled for SLE15-SP3\u0027s new -preempt flavor, leading to a unresolvable dependency to a non-existing kernel-livepatch-x.y.z-preempt package. As SLE12 and SLE12-SP1 have run out of livepatching support, the need to build said metapackage for the -xen flavor is gone and the only remaining flavor for which they\u0027re still wanted is -default. Restrict the build of the kernel-*-livepatch metapackage to the -default flavor.\n- rpm/kernel-obs-build.spec.in: add dm-crypt for building with cryptsetup Co-Authored-By: Adam Spiers \u003caspiers@suse.com\u003e\n- rpm/kernel-obs-build.spec.in: Enable overlayfs Overlayfs is needed for podman or docker builds when no more specific driver can be used (like lvm or btrfs). As the default build fs is ext4 currently, we need overlayfs kernel modules to be available.\n- rpm/kernel-source.spec.in: Add obsolete_rebuilds (boo#1172073).\n- rpm/mkspec-dtb: add mt76 based dtb package\n- rpm/package-descriptions: garbege collection remove old ARM and Xen flavors.\n- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).\n- rtnetlink: Fix memory(net_device) leak when -\u003enewlink fails (git-fixes).\n- s390, dcssblk: kaddr and pfn can be NULL to -\u003edirect_access() (bsc#1174873).\n- sched: consistently handle layer3 header accesses in the presence of VLANs (networking-stable-20_07_17).\n- sched/deadline: Initialize -\u003edl_boosted (bsc#1112178).\n- scripts/git_sort/git_sort.py: add bluetooth/bluetooth-next.git repository\n- scsi: lpfc: Add and rename a whole bunch of function parameter descriptions (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Add description for lpfc_release_rpi()\u0027s \u0027ndlpl param (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Add missing misc_deregister() for lpfc_init() (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Ensure variable has the same stipulations as code using it (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix a bunch of kerneldoc misdemeanors (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix FCoE speed reporting (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix kerneldoc parameter formatting/misnaming/missing issues (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix LUN loss after cable pull (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix no message shown for lpfc_hdw_queue out of range value (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix oops when unloading driver while running mds diags (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix retry of PRLI when status indicates its unsupported (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix RSCN timeout due to incorrect gidft counter (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix some function parameter descriptions (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix typo in comment for ULP (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix-up around 120 documentation issues (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix-up formatting/docrot where appropriate (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix validation of bsg reply lengths (bsc#1171558 bsc#1136666).\n- scsi: lpfc: NVMe remote port devloss_tmo from lldd (bsc#1171558 bsc#1136666 bsc#1173060).\n- scsi: lpfc: nvmet: Avoid hang / use-after-free again when destroying targetport (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Provide description for lpfc_mem_alloc()\u0027s \u0027align\u0027 param (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Quieten some printks (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Remove unused variable \u0027pg_addr\u0027 (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Update lpfc version to 12.8.0.3 (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Use __printf() format notation (bsc#1171558 bsc#1136666).\n- scsi: dh: Add Fujitsu device to devinfo and dh lists (bsc#1174026).\n- scsi: Fix trivial spelling (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Address a set of sparse warnings (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Change {RD,WRT}_REG_*() function names from upper case into lower case (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix endianness annotations in header files (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix endianness annotations in source files (bsc#1171688 bsc#1174003). \n- scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix issue with adapter\u0027s stopping state (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix login timeout (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix null pointer access during disconnect from subsystem (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix spelling of a variable name (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix warning after FC target reset (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Flush all sessions on zone disable (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Flush I/O on zone disable (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Initialize \u0027n\u0027 before using it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Reduce noisy debug message (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove an unused function (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove a superfluous cast (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: SAN congestion management implementation (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use register names instead of register offsets (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use true, false for ha-\u003efw_dumped (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1171688 bsc#1174003).\n- scsi: smartpqi: add bay identifier (bsc#1172418).\n- scsi: smartpqi: add gigabyte controller (bsc#1172418).\n- scsi: smartpqi: add id support for SmartRAID 3152-8i (bsc#1172418).\n- scsi: smartpqi: add inquiry timeouts (bsc#1172418).\n- scsi: smartpqi: add module param for exposure order (bsc#1172418).\n- scsi: smartpqi: add module param to hide vsep (bsc#1172418).\n- scsi: smartpqi: add new pci ids (bsc#1172418).\n- scsi: smartpqi: add pci ids for fiberhome controller (bsc#1172418).\n- scsi: smartpqi: add RAID bypass counter (bsc#1172418).\n- scsi: smartpqi: add sysfs entries (bsc#1172418).\n- scsi: smartpqi: Align driver syntax with oob (bsc#1172418).\n- scsi: smartpqi: avoid crashing kernel for controller issues (bsc#1172418).\n- scsi: smartpqi: bump version (bsc#1172418).\n- scsi: smartpqi: bump version (bsc#1172418).\n- scsi: smartpqi: bump version to 1.2.16-010 (bsc#1172418).\n- scsi: smartpqi: change TMF timeout from 60 to 30 seconds (bsc#1172418).\n- scsi: smartpqi: correct hang when deleting 32 lds (bsc#1172418).\n- scsi: smartpqi: correct REGNEWD return status (bsc#1172418).\n- scsi: smartpqi: correct syntax issue (bsc#1172418).\n- scsi: smartpqi: fix call trace in device discovery (bsc#1172418).\n- scsi: smartpqi: fix controller lockup observed during force reboot (bsc#1172418).\n- scsi: smartpqi: fix LUN reset when fw bkgnd thread is hung (bsc#1172418).\n- scsi: smartpqi: fix problem with unique ID for physical device (bsc#1172418).\n- scsi: smartpqi: identify physical devices without issuing INQUIRY (bsc#1172418).\n- scsi: smartpqi: properly set both the DMA mask and the coherent DMA mask (bsc#1172418).\n- scsi: smartpqi: remove unused manifest constants (bsc#1172418).\n- scsi: smartpqi: Reporting unhandled SCSI errors (bsc#1172418).\n- scsi: smartpqi: support device deletion via sysfs (bsc#1172418).\n- scsi: smartpqi: update copyright (bsc#1172418).\n- scsi: smartpqi: update logical volume size after expansion (bsc#1172418).\n- scsi: smartpqi: Use scnprintf() for avoiding potential buffer overflow (bsc#1172418).\n- scsi: storvsc: Correctly set number of hardware queues for IDE disk (git-fixes).\n- scsi: target/iblock: fix WRITE SAME zeroing (bsc#1169790).\n- sctp: Do not advertise IPv4 addresses if ipv6only is set on the socket (networking-stable-20_06_28).\n- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).\n- serial: 8250: change lock order in serial8250_do_startup() (git-fixes).\n- serial: pl011: Do not leak amba_ports entry on driver register error (git-fixes).\n- serial: pl011: Fix oops on -EPROBE_DEFER (git-fixes).\n- Set VIRTIO_CONSOLE=y (bsc#1175667).\n- sign also s390x kernel images (bsc#1163524)\n- soc: fsl: qbman: allow registering a device link for the portal user (bsc#1174550).\n- soc: fsl: qbman_portals: add APIs to retrieve the probing status (bsc#1174550).\n- spi: davinci: Remove uninitialized_var() usage (git-fixes).\n- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).\n- spi: nxp-fspi: Ensure width is respected in spi-mem operations (bsc#1175421).\n- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1175422).\n- spi: spi-mem: export spi_mem_default_supports_op() (bsc#1175421).\n- staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).\n- staging: fsl-dpaa2: ethsw: Add missing netdevice check (bsc#1175423).\n- staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).\n- staging/speakup: fix get_word non-space look-ahead (git-fixes).\n- tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT (networking-stable-20_06_28).\n- tcp: grow window for OOO packets only for SACK flows (networking-stable-20_06_28).\n- tcp: make sure listeners do not initialize congestion-control state (networking-stable-20_07_17).\n- tcp: md5: add missing memory barriers in tcp_md5_do_add()/tcp_md5_hash_key() (networking-stable-20_07_17).\n- tcp: md5: do not send silly options in SYNCOOKIES (networking-stable-20_07_17).\n- tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key() barriers (networking-stable-20_07_17).\n- tracepoint: Mark __tracepoint_string\u0027s __used (git-fixes).\n- tracing: Use trace_sched_process_free() instead of exit() for pid tracing (git-fixes).\n- tty: hvc_console, fix crashes on parallel open/close (git-fixes).\n- tty: serial: fsl_lpuart: add imx8qxp support (bsc#1175670).\n- tty: serial: fsl_lpuart: free IDs allocated by IDA (bsc#1175670).\n- USB: cdc-acm: rework notification_buffer resizing (git-fixes).\n- USB: gadget: f_tcm: Fix some resource leaks in some error paths (git-fixes).\n- USB: host: ohci-exynos: Fix error handling in exynos_ohci_probe() (git-fixes).\n- USB: Ignore UAS for JMicron JMS567 ATA/ATAPI Bridge (git-fixes).\n- USB: iowarrior: fix up report size handling for some devices (git-fixes).\n- usbip: tools: fix module name in man page (git-fixes).\n- USB: rename USB quirk to USB_QUIRK_ENDPOINT_IGNORE (git-fixes).\n- USB: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).\n- USB: serial: cp210x: re-enable auto-RTS on open (git-fixes).\n- USB: serial: ftdi_sio: clean up receive processing (git-fixes).\n- USB: serial: ftdi_sio: fix break and sysrq handling (git-fixes).\n- USB: serial: ftdi_sio: make process-packet buffer unsigned (git-fixes).\n- USB: serial: iuu_phoenix: fix led-activity helpers (git-fixes).\n- USB: serial: qcserial: add EM7305 QDL product ID (git-fixes).\n- USB: xhci: define IDs for various ASMedia host controllers (git-fixes).\n- USB: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).\n- USB: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).\n- USB: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).\n- VFS: Check rename_lock in lookup_fast() (bsc#1174734).\n- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).\n- video: pxafb: Fix the function used to balance a \u0027dma_alloc_coherent()\u0027 call (git-fixes).\n- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).\n- vlan: consolidate VLAN parsing code and limit max parsing depth (networking-stable-20_07_17).\n- vmxnet3: use correct tcp hdr length when packet is encapsulated (bsc#1175199).\n- vt_compat_ioctl(): clean up, use compat_ptr() properly (git-fixes).\n- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).\n- vxlan: Ensure FDB dump is performed under RCU (git-fixes).\n- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (bsc#1111666).\n- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (bsc#1111666).\n- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (bsc#1111666).\n- wl1251: fix always return 0 error (git-fixes).\n- x86/hyperv: Create and use Hyper-V page definitions (git-fixes).\n- x86/hyper-v: Fix overflow bug in fill_gva_list() (git-fixes).\n- x86/hyperv: Make hv_vcpu_is_preempted() visible (git-fixes).\n- x86/mce/inject: Fix a wrong assignment of i_mce.status (bsc#1112178).\n- x86/unwind/orc: Fix ORC for newly forked tasks (bsc#1058115).\n- xen/balloon: fix accounting in alloc_xenballooned_pages error path (bsc#1065600).\n- xen/balloon: make the balloon wait interruptible (bsc#1065600).\n- xfrm: check id proto in validate_tmpl() (git-fixes).\n- xfrm: clean up xfrm protocol checks (git-fixes).\n- xfrm_user: uncoditionally validate esn replay attribute struct (git-fixes).\n- xfs: fix inode allocation block res calculation precedence (git-fixes).\n- xfs: fix reflink quota reservation accounting error (git-fixes).\n- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2575,SUSE-SLE-Module-Basesystem-15-SP1-2020-2575,SUSE-SLE-Module-Development-Tools-15-SP1-2020-2575,SUSE-SLE-Module-Legacy-15-SP1-2020-2575,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2575,SUSE-SLE-Product-HA-15-SP1-2020-2575,SUSE-SLE-Product-WE-15-SP1-2020-2575", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2575-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2575-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202575-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2575-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1083548", "url": "https://bugzilla.suse.com/1083548" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1120163", "url": "https://bugzilla.suse.com/1120163" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1136666", "url": "https://bugzilla.suse.com/1136666" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1152148", "url": "https://bugzilla.suse.com/1152148" }, { "category": "self", "summary": "SUSE Bug 1163524", "url": "https://bugzilla.suse.com/1163524" }, { "category": "self", "summary": "SUSE Bug 1165629", "url": "https://bugzilla.suse.com/1165629" }, { "category": "self", "summary": "SUSE Bug 1166965", "url": "https://bugzilla.suse.com/1166965" }, { "category": "self", "summary": "SUSE Bug 1169790", "url": "https://bugzilla.suse.com/1169790" }, { "category": "self", "summary": "SUSE Bug 1170232", "url": "https://bugzilla.suse.com/1170232" }, { "category": "self", "summary": "SUSE Bug 1171558", "url": "https://bugzilla.suse.com/1171558" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1171988", "url": "https://bugzilla.suse.com/1171988" }, { "category": "self", "summary": "SUSE Bug 1172073", "url": "https://bugzilla.suse.com/1172073" }, { "category": "self", "summary": "SUSE Bug 1172108", "url": "https://bugzilla.suse.com/1172108" }, { "category": "self", "summary": "SUSE Bug 1172247", "url": "https://bugzilla.suse.com/1172247" }, { "category": "self", "summary": "SUSE Bug 1172418", "url": "https://bugzilla.suse.com/1172418" }, { "category": "self", "summary": "SUSE Bug 1172428", "url": "https://bugzilla.suse.com/1172428" }, { "category": "self", "summary": "SUSE Bug 1172871", "url": "https://bugzilla.suse.com/1172871" }, { "category": "self", "summary": "SUSE Bug 1172872", "url": "https://bugzilla.suse.com/1172872" }, { "category": "self", "summary": "SUSE Bug 1172873", "url": "https://bugzilla.suse.com/1172873" }, { "category": "self", "summary": "SUSE Bug 1172963", "url": "https://bugzilla.suse.com/1172963" }, { "category": "self", "summary": "SUSE Bug 1173060", "url": "https://bugzilla.suse.com/1173060" }, { "category": "self", "summary": "SUSE Bug 1173485", "url": "https://bugzilla.suse.com/1173485" }, { "category": "self", "summary": "SUSE Bug 1173798", "url": "https://bugzilla.suse.com/1173798" }, { "category": "self", "summary": "SUSE Bug 1173954", "url": "https://bugzilla.suse.com/1173954" }, { "category": "self", "summary": "SUSE Bug 1174003", "url": "https://bugzilla.suse.com/1174003" }, { "category": "self", "summary": "SUSE Bug 1174026", "url": "https://bugzilla.suse.com/1174026" }, { "category": "self", "summary": "SUSE Bug 1174070", "url": "https://bugzilla.suse.com/1174070" }, { "category": "self", "summary": "SUSE Bug 1174205", "url": "https://bugzilla.suse.com/1174205" }, { "category": "self", "summary": "SUSE Bug 1174387", "url": "https://bugzilla.suse.com/1174387" }, { "category": "self", "summary": "SUSE Bug 1174484", "url": "https://bugzilla.suse.com/1174484" }, { "category": "self", "summary": "SUSE Bug 1174547", "url": "https://bugzilla.suse.com/1174547" }, { "category": "self", "summary": "SUSE Bug 1174549", "url": "https://bugzilla.suse.com/1174549" }, { "category": "self", "summary": "SUSE Bug 1174550", "url": "https://bugzilla.suse.com/1174550" }, { "category": "self", "summary": "SUSE Bug 1174625", "url": "https://bugzilla.suse.com/1174625" }, { "category": "self", "summary": "SUSE Bug 1174658", "url": "https://bugzilla.suse.com/1174658" }, { "category": "self", "summary": "SUSE Bug 1174685", "url": "https://bugzilla.suse.com/1174685" }, { "category": "self", "summary": "SUSE Bug 1174689", "url": "https://bugzilla.suse.com/1174689" }, { "category": "self", "summary": "SUSE Bug 1174699", "url": "https://bugzilla.suse.com/1174699" }, { "category": "self", "summary": "SUSE Bug 1174734", "url": "https://bugzilla.suse.com/1174734" }, { "category": "self", "summary": "SUSE Bug 1174757", "url": "https://bugzilla.suse.com/1174757" }, { "category": "self", "summary": "SUSE Bug 1174771", "url": "https://bugzilla.suse.com/1174771" }, { "category": "self", "summary": "SUSE Bug 1174840", "url": "https://bugzilla.suse.com/1174840" }, { "category": "self", "summary": "SUSE Bug 1174841", "url": "https://bugzilla.suse.com/1174841" }, { "category": "self", "summary": "SUSE Bug 1174843", "url": "https://bugzilla.suse.com/1174843" }, { "category": "self", "summary": "SUSE Bug 1174844", "url": "https://bugzilla.suse.com/1174844" }, { "category": "self", "summary": "SUSE Bug 1174845", "url": "https://bugzilla.suse.com/1174845" }, { "category": "self", "summary": "SUSE Bug 1174852", "url": "https://bugzilla.suse.com/1174852" }, { "category": "self", "summary": "SUSE Bug 1174873", "url": "https://bugzilla.suse.com/1174873" }, { "category": "self", "summary": "SUSE Bug 1174904", "url": "https://bugzilla.suse.com/1174904" }, { "category": "self", "summary": "SUSE Bug 1174926", "url": "https://bugzilla.suse.com/1174926" }, { "category": "self", "summary": "SUSE Bug 1174968", "url": "https://bugzilla.suse.com/1174968" }, { "category": "self", "summary": "SUSE Bug 1175062", "url": "https://bugzilla.suse.com/1175062" }, { "category": "self", "summary": "SUSE Bug 1175063", "url": "https://bugzilla.suse.com/1175063" }, { "category": "self", "summary": "SUSE Bug 1175064", "url": "https://bugzilla.suse.com/1175064" }, { "category": "self", "summary": "SUSE Bug 1175065", "url": "https://bugzilla.suse.com/1175065" }, { "category": "self", "summary": "SUSE Bug 1175066", "url": "https://bugzilla.suse.com/1175066" }, { "category": "self", "summary": "SUSE Bug 1175067", "url": "https://bugzilla.suse.com/1175067" }, { "category": "self", "summary": "SUSE Bug 1175112", "url": "https://bugzilla.suse.com/1175112" }, { "category": "self", "summary": "SUSE Bug 1175127", "url": "https://bugzilla.suse.com/1175127" }, { "category": "self", "summary": "SUSE Bug 1175128", "url": "https://bugzilla.suse.com/1175128" }, { "category": "self", "summary": "SUSE Bug 1175149", "url": "https://bugzilla.suse.com/1175149" }, { "category": "self", "summary": "SUSE Bug 1175199", "url": "https://bugzilla.suse.com/1175199" }, { "category": "self", "summary": "SUSE Bug 1175213", "url": "https://bugzilla.suse.com/1175213" }, { "category": "self", "summary": "SUSE Bug 1175228", "url": "https://bugzilla.suse.com/1175228" }, { "category": "self", "summary": "SUSE Bug 1175232", "url": "https://bugzilla.suse.com/1175232" }, { "category": "self", "summary": "SUSE Bug 1175284", "url": "https://bugzilla.suse.com/1175284" }, { "category": "self", "summary": "SUSE Bug 1175393", "url": "https://bugzilla.suse.com/1175393" }, { "category": "self", "summary": "SUSE Bug 1175394", "url": "https://bugzilla.suse.com/1175394" }, { "category": "self", "summary": "SUSE Bug 1175396", "url": "https://bugzilla.suse.com/1175396" }, { "category": "self", "summary": "SUSE Bug 1175397", "url": "https://bugzilla.suse.com/1175397" }, { "category": "self", "summary": "SUSE Bug 1175398", "url": "https://bugzilla.suse.com/1175398" }, { "category": "self", "summary": "SUSE Bug 1175399", "url": "https://bugzilla.suse.com/1175399" }, { "category": "self", "summary": "SUSE Bug 1175400", "url": "https://bugzilla.suse.com/1175400" }, { "category": "self", "summary": "SUSE Bug 1175401", "url": "https://bugzilla.suse.com/1175401" }, { "category": "self", "summary": "SUSE Bug 1175402", "url": "https://bugzilla.suse.com/1175402" }, { "category": "self", "summary": "SUSE Bug 1175403", "url": "https://bugzilla.suse.com/1175403" }, { "category": "self", "summary": "SUSE Bug 1175404", "url": "https://bugzilla.suse.com/1175404" }, { "category": "self", "summary": "SUSE Bug 1175405", "url": "https://bugzilla.suse.com/1175405" }, { "category": "self", "summary": "SUSE Bug 1175406", "url": "https://bugzilla.suse.com/1175406" }, { "category": "self", "summary": "SUSE Bug 1175407", "url": "https://bugzilla.suse.com/1175407" }, { "category": "self", "summary": "SUSE Bug 1175408", "url": "https://bugzilla.suse.com/1175408" }, { "category": "self", "summary": "SUSE Bug 1175409", "url": "https://bugzilla.suse.com/1175409" }, { "category": "self", "summary": "SUSE Bug 1175410", "url": "https://bugzilla.suse.com/1175410" }, { "category": "self", "summary": "SUSE Bug 1175411", "url": "https://bugzilla.suse.com/1175411" }, { "category": "self", "summary": "SUSE Bug 1175412", "url": "https://bugzilla.suse.com/1175412" }, { "category": "self", "summary": "SUSE Bug 1175413", "url": "https://bugzilla.suse.com/1175413" }, { "category": "self", "summary": "SUSE Bug 1175414", "url": "https://bugzilla.suse.com/1175414" }, { "category": "self", "summary": "SUSE Bug 1175415", "url": "https://bugzilla.suse.com/1175415" }, { "category": "self", "summary": "SUSE Bug 1175416", "url": "https://bugzilla.suse.com/1175416" }, { "category": "self", "summary": "SUSE Bug 1175417", "url": "https://bugzilla.suse.com/1175417" }, { "category": "self", "summary": "SUSE Bug 1175418", "url": "https://bugzilla.suse.com/1175418" }, { "category": "self", "summary": "SUSE Bug 1175419", "url": "https://bugzilla.suse.com/1175419" }, { "category": "self", "summary": "SUSE Bug 1175420", "url": "https://bugzilla.suse.com/1175420" }, { "category": "self", "summary": "SUSE Bug 1175421", "url": "https://bugzilla.suse.com/1175421" }, { "category": "self", "summary": "SUSE Bug 1175422", "url": "https://bugzilla.suse.com/1175422" }, { "category": "self", "summary": "SUSE Bug 1175423", "url": "https://bugzilla.suse.com/1175423" }, { "category": "self", "summary": "SUSE Bug 1175440", "url": "https://bugzilla.suse.com/1175440" }, { "category": "self", "summary": "SUSE Bug 1175493", "url": "https://bugzilla.suse.com/1175493" }, { "category": "self", "summary": "SUSE Bug 1175515", "url": "https://bugzilla.suse.com/1175515" }, { "category": "self", "summary": "SUSE Bug 1175518", "url": "https://bugzilla.suse.com/1175518" }, { "category": "self", "summary": "SUSE Bug 1175526", "url": "https://bugzilla.suse.com/1175526" }, { "category": "self", "summary": "SUSE Bug 1175550", "url": "https://bugzilla.suse.com/1175550" }, { "category": "self", "summary": "SUSE Bug 1175654", "url": "https://bugzilla.suse.com/1175654" }, { "category": "self", "summary": "SUSE Bug 1175666", "url": "https://bugzilla.suse.com/1175666" }, { "category": "self", "summary": "SUSE Bug 1175667", "url": "https://bugzilla.suse.com/1175667" }, { "category": "self", "summary": "SUSE Bug 1175668", "url": "https://bugzilla.suse.com/1175668" }, { "category": "self", "summary": "SUSE Bug 1175669", "url": "https://bugzilla.suse.com/1175669" }, { "category": "self", "summary": "SUSE Bug 1175670", "url": "https://bugzilla.suse.com/1175670" }, { "category": "self", "summary": "SUSE Bug 1175691", "url": "https://bugzilla.suse.com/1175691" }, { "category": "self", "summary": "SUSE Bug 1175767", "url": "https://bugzilla.suse.com/1175767" }, { "category": "self", "summary": "SUSE Bug 1175768", "url": "https://bugzilla.suse.com/1175768" }, { "category": "self", "summary": "SUSE Bug 1175769", "url": "https://bugzilla.suse.com/1175769" }, { "category": "self", "summary": "SUSE Bug 1175770", "url": "https://bugzilla.suse.com/1175770" }, { "category": "self", "summary": "SUSE Bug 1175771", "url": "https://bugzilla.suse.com/1175771" }, { "category": "self", "summary": "SUSE Bug 1175772", "url": "https://bugzilla.suse.com/1175772" }, { "category": "self", "summary": "SUSE Bug 1175786", "url": "https://bugzilla.suse.com/1175786" }, { "category": "self", "summary": "SUSE Bug 1175873", "url": "https://bugzilla.suse.com/1175873" }, { "category": "self", "summary": "SUSE Bug 1176069", "url": "https://bugzilla.suse.com/1176069" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14314 page", "url": "https://www.suse.com/security/cve/CVE-2020-14314/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14356 page", "url": "https://www.suse.com/security/cve/CVE-2020-14356/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14386 page", "url": "https://www.suse.com/security/cve/CVE-2020-14386/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16166 page", "url": "https://www.suse.com/security/cve/CVE-2020-16166/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1749 page", "url": "https://www.suse.com/security/cve/CVE-2020-1749/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24394 page", "url": "https://www.suse.com/security/cve/CVE-2020-24394/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-09-09T05:16:14Z", "generator": { "date": "2020-09-09T05:16:14Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2575-1", "initial_release_date": "2020-09-09T05:16:14Z", "revision_history": [ { "date": "2020-09-09T05:16:14Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.56.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-197.56.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-197.56.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.56.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-197.56.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-197.56.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.56.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-197.56.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-197.56.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.56.1.aarch64", "product": { "name": "kernel-default-4.12.14-197.56.1.aarch64", "product_id": "kernel-default-4.12.14-197.56.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.56.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-197.56.1.aarch64", "product_id": "kernel-default-base-4.12.14-197.56.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.56.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-197.56.1.aarch64", "product_id": "kernel-default-devel-4.12.14-197.56.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.56.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-197.56.1.aarch64", "product_id": "kernel-default-extra-4.12.14-197.56.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.56.1.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-197.56.1.aarch64", "product_id": "kernel-default-livepatch-4.12.14-197.56.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.56.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.56.1.aarch64", "product_id": "kernel-default-livepatch-devel-4.12.14-197.56.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.56.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-197.56.1.aarch64", "product_id": "kernel-obs-build-4.12.14-197.56.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.56.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-197.56.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-197.56.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.56.1.aarch64", "product": { "name": "kernel-syms-4.12.14-197.56.1.aarch64", "product_id": "kernel-syms-4.12.14-197.56.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.56.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-197.56.1.aarch64", "product_id": "kernel-vanilla-4.12.14-197.56.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.56.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-197.56.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-197.56.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.56.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-197.56.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-197.56.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.56.1.aarch64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.56.1.aarch64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.56.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.56.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-197.56.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-197.56.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.56.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-197.56.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-197.56.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.56.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-197.56.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-197.56.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-197.56.1.noarch", "product": { "name": "kernel-devel-4.12.14-197.56.1.noarch", "product_id": "kernel-devel-4.12.14-197.56.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-197.56.1.noarch", "product": { "name": "kernel-docs-4.12.14-197.56.1.noarch", "product_id": "kernel-docs-4.12.14-197.56.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-197.56.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-197.56.1.noarch", "product_id": "kernel-docs-html-4.12.14-197.56.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-197.56.1.noarch", "product": { "name": "kernel-macros-4.12.14-197.56.1.noarch", "product_id": "kernel-macros-4.12.14-197.56.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-197.56.1.noarch", "product": { "name": "kernel-source-4.12.14-197.56.1.noarch", "product_id": "kernel-source-4.12.14-197.56.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-197.56.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-197.56.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-197.56.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.56.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-197.56.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-197.56.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.56.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-197.56.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-197.56.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.56.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-197.56.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-197.56.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-197.56.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-197.56.1.ppc64le", "product_id": "kernel-debug-4.12.14-197.56.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-197.56.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-197.56.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-197.56.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-197.56.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-197.56.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-197.56.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-197.56.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-197.56.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-4.12.14-197.56.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.56.1.ppc64le", "product": { "name": "kernel-default-4.12.14-197.56.1.ppc64le", "product_id": "kernel-default-4.12.14-197.56.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.56.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-197.56.1.ppc64le", "product_id": "kernel-default-base-4.12.14-197.56.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.56.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-197.56.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-197.56.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.56.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-197.56.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-197.56.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.56.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-197.56.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-197.56.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le", "product_id": "kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.56.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-197.56.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-197.56.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.56.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-197.56.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-197.56.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.56.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-197.56.1.ppc64le", "product_id": "kernel-syms-4.12.14-197.56.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.56.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-197.56.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-197.56.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.56.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-197.56.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-197.56.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.56.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-197.56.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-197.56.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.56.1.ppc64le", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.56.1.ppc64le", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.56.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.56.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-197.56.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-197.56.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.56.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-197.56.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-197.56.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.56.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-197.56.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-197.56.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.56.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-197.56.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-197.56.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.56.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-197.56.1.s390x", "product_id": "dlm-kmp-default-4.12.14-197.56.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.56.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-197.56.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-197.56.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.56.1.s390x", "product": { "name": "kernel-default-4.12.14-197.56.1.s390x", "product_id": "kernel-default-4.12.14-197.56.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.56.1.s390x", "product": { "name": "kernel-default-base-4.12.14-197.56.1.s390x", "product_id": "kernel-default-base-4.12.14-197.56.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.56.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-197.56.1.s390x", "product_id": "kernel-default-devel-4.12.14-197.56.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.56.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-197.56.1.s390x", "product_id": "kernel-default-extra-4.12.14-197.56.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.56.1.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-197.56.1.s390x", "product_id": "kernel-default-livepatch-4.12.14-197.56.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.56.1.s390x", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.56.1.s390x", "product_id": "kernel-default-livepatch-devel-4.12.14-197.56.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-197.56.1.s390x", "product": { "name": "kernel-default-man-4.12.14-197.56.1.s390x", "product_id": "kernel-default-man-4.12.14-197.56.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.56.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-197.56.1.s390x", "product_id": "kernel-obs-build-4.12.14-197.56.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.56.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-197.56.1.s390x", "product_id": "kernel-obs-qa-4.12.14-197.56.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.56.1.s390x", "product": { "name": "kernel-syms-4.12.14-197.56.1.s390x", "product_id": "kernel-syms-4.12.14-197.56.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.56.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-197.56.1.s390x", "product_id": "kernel-vanilla-4.12.14-197.56.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.56.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-197.56.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-197.56.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.56.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-197.56.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-197.56.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.56.1.s390x", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.56.1.s390x", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.56.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-197.56.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-197.56.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-197.56.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-197.56.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-197.56.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-197.56.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.56.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-197.56.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-197.56.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.56.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-197.56.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-197.56.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.56.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-197.56.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-197.56.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.56.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-197.56.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-197.56.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.56.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-197.56.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-197.56.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.56.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-197.56.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-197.56.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-197.56.1.x86_64", "product": { "name": "kernel-debug-4.12.14-197.56.1.x86_64", "product_id": "kernel-debug-4.12.14-197.56.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-197.56.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-197.56.1.x86_64", "product_id": "kernel-debug-base-4.12.14-197.56.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-197.56.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-197.56.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-197.56.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-197.56.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-197.56.1.x86_64", "product_id": "kernel-debug-livepatch-devel-4.12.14-197.56.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.56.1.x86_64", "product": { "name": "kernel-default-4.12.14-197.56.1.x86_64", "product_id": "kernel-default-4.12.14-197.56.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.56.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-197.56.1.x86_64", "product_id": "kernel-default-base-4.12.14-197.56.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.56.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-197.56.1.x86_64", "product_id": "kernel-default-devel-4.12.14-197.56.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.56.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-197.56.1.x86_64", "product_id": "kernel-default-extra-4.12.14-197.56.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.56.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-197.56.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-197.56.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64", "product_id": "kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-197.56.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-197.56.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-197.56.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-197.56.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-197.56.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-197.56.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-197.56.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-197.56.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-197.56.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.56.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.56.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-197.56.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64", "product_id": "kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.56.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-197.56.1.x86_64", "product_id": "kernel-obs-build-4.12.14-197.56.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.56.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-197.56.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-197.56.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.56.1.x86_64", "product": { "name": "kernel-syms-4.12.14-197.56.1.x86_64", "product_id": "kernel-syms-4.12.14-197.56.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.56.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-197.56.1.x86_64", "product_id": "kernel-vanilla-4.12.14-197.56.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.56.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-197.56.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-197.56.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.56.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-197.56.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-197.56.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.56.1.x86_64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.56.1.x86_64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.56.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.56.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-197.56.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-197.56.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.56.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-197.56.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-197.56.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.56.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-197.56.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-197.56.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15 SP1", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.56.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.aarch64" }, "product_reference": "kernel-default-4.12.14-197.56.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.56.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-197.56.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.56.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.s390x" }, "product_reference": "kernel-default-4.12.14-197.56.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.56.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.56.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.56.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-197.56.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.56.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-197.56.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.56.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-197.56.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.56.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.56.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.56.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-197.56.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.56.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-197.56.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.56.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-197.56.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.56.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.56.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-197.56.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.56.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-197.56.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.56.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.56.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.56.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.56.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.56.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.56.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.56.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-197.56.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.56.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-197.56.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.56.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-197.56.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.56.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.56.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.56.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.56.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.56.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.56.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-197.56.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.56.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-197.56.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.56.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.s390x" }, "product_reference": "kernel-syms-4.12.14-197.56.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.56.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.56.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.56.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.56.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.56.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.56.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.56.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.56.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.56.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.56.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-197.56.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-197.56.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-197.56.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-197.56.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.56.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.56.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.56.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.56.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.56.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.56.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.56.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.56.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.56.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-197.56.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.56.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-197.56.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.56.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-197.56.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.56.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-197.56.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.56.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-197.56.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.56.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-197.56.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.56.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-197.56.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.56.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-197.56.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.56.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.56.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.56.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.56.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.56.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.56.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.56.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.56.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-197.56.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.56.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-197.56.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.56.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.56.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.56.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-09T05:16:14Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-14314", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14314" } ], "notes": [ { "category": "general", "text": "A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.56.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14314", "url": "https://www.suse.com/security/cve/CVE-2020-14314" }, { "category": "external", "summary": "SUSE Bug 1173798 for CVE-2020-14314", "url": "https://bugzilla.suse.com/1173798" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.56.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.56.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-09T05:16:14Z", "details": "moderate" } ], "title": "CVE-2020-14314" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.56.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.56.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.56.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-09T05:16:14Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14356" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.56.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14356", "url": "https://www.suse.com/security/cve/CVE-2020-14356" }, { "category": "external", "summary": "SUSE Bug 1175213 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1175213" }, { "category": "external", "summary": "SUSE Bug 1176392 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1176392" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.56.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.56.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-09T05:16:14Z", "details": "moderate" } ], "title": "CVE-2020-14356" }, { "cve": "CVE-2020-14386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14386" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.56.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14386", "url": "https://www.suse.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "SUSE Bug 1176069 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176069" }, { "category": "external", "summary": "SUSE Bug 1176072 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.56.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.56.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-09T05:16:14Z", "details": "important" } ], "title": "CVE-2020-14386" }, { "cve": "CVE-2020-16166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16166" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.56.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16166", "url": "https://www.suse.com/security/cve/CVE-2020-16166" }, { "category": "external", "summary": "SUSE Bug 1174757 for CVE-2020-16166", "url": "https://bugzilla.suse.com/1174757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.56.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.56.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-09T05:16:14Z", "details": "moderate" } ], "title": "CVE-2020-16166" }, { "cve": "CVE-2020-1749", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1749" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.56.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1749", "url": "https://www.suse.com/security/cve/CVE-2020-1749" }, { "category": "external", "summary": "SUSE Bug 1165629 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165629" }, { "category": "external", "summary": "SUSE Bug 1165631 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165631" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177513" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1189302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.56.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.56.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-09T05:16:14Z", "details": "important" } ], "title": "CVE-2020-1749" }, { "cve": "CVE-2020-24394", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24394" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.56.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24394", "url": "https://www.suse.com/security/cve/CVE-2020-24394" }, { "category": "external", "summary": "SUSE Bug 1175518 for CVE-2020-24394", "url": "https://bugzilla.suse.com/1175518" }, { "category": "external", "summary": "SUSE Bug 1175992 for CVE-2020-24394", "url": "https://bugzilla.suse.com/1175992" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.56.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-1-3.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.56.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.56.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.56.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-09T05:16:14Z", "details": "important" } ], "title": "CVE-2020-24394" } ] }
suse-su-2020:2502-1
Vulnerability from csaf_suse
Published
2020-09-04 11:30
Modified
2020-09-04 11:30
Summary
Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3)
Description of the patch
This update for the Linux Kernel 4.4.180-94_127 fixes several issues.
The following security issues were fixed:
- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2020-1749: Fixed a flaw in IPsec where some IPv6 protocols were not encrypted (bsc#1165631).
Patchnames
SUSE-2020-2502,SUSE-SLE-SAP-12-SP2-2020-2494,SUSE-SLE-SAP-12-SP2-2020-2495,SUSE-SLE-SAP-12-SP3-2020-2500,SUSE-SLE-SAP-12-SP3-2020-2501,SUSE-SLE-SAP-12-SP3-2020-2502,SUSE-SLE-SERVER-12-SP2-2020-2494,SUSE-SLE-SERVER-12-SP2-2020-2495,SUSE-SLE-SERVER-12-SP3-2020-2500,SUSE-SLE-SERVER-12-SP3-2020-2501,SUSE-SLE-SERVER-12-SP3-2020-2502
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.180-94_127 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).\n- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).\n- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).\n- CVE-2020-1749: Fixed a flaw in IPsec where some IPv6 protocols were not encrypted (bsc#1165631).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2502,SUSE-SLE-SAP-12-SP2-2020-2494,SUSE-SLE-SAP-12-SP2-2020-2495,SUSE-SLE-SAP-12-SP3-2020-2500,SUSE-SLE-SAP-12-SP3-2020-2501,SUSE-SLE-SAP-12-SP3-2020-2502,SUSE-SLE-SERVER-12-SP2-2020-2494,SUSE-SLE-SERVER-12-SP2-2020-2495,SUSE-SLE-SERVER-12-SP3-2020-2500,SUSE-SLE-SERVER-12-SP3-2020-2501,SUSE-SLE-SERVER-12-SP3-2020-2502", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2502-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2502-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202502-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2502-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007360.html" }, { "category": "self", "summary": "SUSE Bug 1165631", "url": "https://bugzilla.suse.com/1165631" }, { "category": "self", "summary": "SUSE Bug 1173659", "url": "https://bugzilla.suse.com/1173659" }, { "category": "self", "summary": "SUSE Bug 1173942", "url": "https://bugzilla.suse.com/1173942" }, { "category": "self", "summary": "SUSE Bug 1174247", "url": "https://bugzilla.suse.com/1174247" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11668 page", "url": "https://www.suse.com/security/cve/CVE-2020-11668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1749 page", "url": "https://www.suse.com/security/cve/CVE-2020-1749/" } ], "title": "Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3)", "tracking": { "current_release_date": "2020-09-04T11:30:30Z", "generator": { "date": "2020-09-04T11:30:30Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2502-1", "initial_release_date": "2020-09-04T11:30:30Z", "revision_history": [ { "date": "2020-09-04T11:30:30Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "product": { "name": "kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "product_id": "kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "product": { "name": "kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "product_id": "kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "product": { "name": "kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "product_id": "kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "product": { "name": "kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "product_id": "kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "product": { "name": "kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "product_id": "kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64", "product": { "name": "kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64", "product_id": "kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "product_id": "kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "product_id": "kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "product": { "name": "kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "product_id": "kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "product": { "name": "kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "product_id": "kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:30:30Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2020-11668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11668" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11668", "url": "https://www.suse.com/security/cve/CVE-2020-11668" }, { "category": "external", "summary": "SUSE Bug 1168952 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1168952" }, { "category": "external", "summary": "SUSE Bug 1173942 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1173942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:30:30Z", "details": "important" } ], "title": "CVE-2020-11668" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:30:30Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-1749", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1749" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1749", "url": "https://www.suse.com/security/cve/CVE-2020-1749" }, { "category": "external", "summary": "SUSE Bug 1165629 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165629" }, { "category": "external", "summary": "SUSE Bug 1165631 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165631" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177513" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1189302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_135-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_121-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:30:30Z", "details": "important" } ], "title": "CVE-2020-1749" } ] }
suse-su-2020:2582-1
Vulnerability from csaf_suse
Published
2020-09-09 13:26
Modified
2020-09-09 13:26
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).
- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).
- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).
- CVE-2019-16746: Fixed an improper check of the length of variable elements in a beacon head, leading to a buffer overflow (bsc#1152107).
- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).
The following non-security bugs were fixed:
- bonding: fix active-backup failover for current ARP slave (bsc#1174771).
- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127).
- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).
- mm, vmstat: reduce zone->lock holding time by /proc/pagetypeinfo (bsc#1175691).
- ocfs2: add trimfs dlm lock resource (bsc#1175228).
- ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).
- ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).
Patchnames
HPE-Helion-OpenStack-8-2020-2582,SUSE-2020-2582,SUSE-OpenStack-Cloud-8-2020-2582,SUSE-OpenStack-Cloud-Crowbar-8-2020-2582,SUSE-SLE-HA-12-SP3-2020-2582,SUSE-SLE-SAP-12-SP3-2020-2582,SUSE-SLE-SERVER-12-SP3-2020-2582,SUSE-SLE-SERVER-12-SP3-BCL-2020-2582,SUSE-Storage-5-2020-2582
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).\n- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).\n- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).\n- CVE-2019-16746: Fixed an improper check of the length of variable elements in a beacon head, leading to a buffer overflow (bsc#1152107).\n- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).\n\nThe following non-security bugs were fixed:\n\n- bonding: fix active-backup failover for current ARP slave (bsc#1174771).\n- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127).\n- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).\n- mm, vmstat: reduce zone-\u003elock holding time by /proc/pagetypeinfo (bsc#1175691).\n- ocfs2: add trimfs dlm lock resource (bsc#1175228).\n- ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).\n- ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).\n", "title": "Description of the patch" }, { "category": "details", "text": "HPE-Helion-OpenStack-8-2020-2582,SUSE-2020-2582,SUSE-OpenStack-Cloud-8-2020-2582,SUSE-OpenStack-Cloud-Crowbar-8-2020-2582,SUSE-SLE-HA-12-SP3-2020-2582,SUSE-SLE-SAP-12-SP3-2020-2582,SUSE-SLE-SERVER-12-SP3-2020-2582,SUSE-SLE-SERVER-12-SP3-BCL-2020-2582,SUSE-Storage-5-2020-2582", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2582-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2582-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202582-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2582-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007393.html" }, { "category": "self", "summary": "SUSE Bug 1152107", "url": "https://bugzilla.suse.com/1152107" }, { "category": "self", "summary": "SUSE Bug 1173798", "url": "https://bugzilla.suse.com/1173798" }, { "category": "self", "summary": "SUSE Bug 1174205", "url": "https://bugzilla.suse.com/1174205" }, { "category": "self", "summary": "SUSE Bug 1174757", "url": "https://bugzilla.suse.com/1174757" }, { "category": "self", "summary": "SUSE Bug 1174771", "url": "https://bugzilla.suse.com/1174771" }, { "category": "self", "summary": "SUSE Bug 1175112", "url": "https://bugzilla.suse.com/1175112" }, { "category": "self", "summary": "SUSE Bug 1175127", "url": "https://bugzilla.suse.com/1175127" }, { "category": "self", "summary": "SUSE Bug 1175228", "url": "https://bugzilla.suse.com/1175228" }, { "category": "self", "summary": "SUSE Bug 1175691", "url": "https://bugzilla.suse.com/1175691" }, { "category": "self", "summary": "SUSE Bug 1176069", "url": "https://bugzilla.suse.com/1176069" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14314 page", "url": "https://www.suse.com/security/cve/CVE-2020-14314/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14386 page", "url": "https://www.suse.com/security/cve/CVE-2020-14386/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16166 page", "url": "https://www.suse.com/security/cve/CVE-2020-16166/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-09-09T13:26:22Z", "generator": { "date": "2020-09-09T13:26:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2582-1", "initial_release_date": "2020-09-09T13:26:22Z", "revision_history": [ { "date": "2020-09-09T13:26:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.130.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.4.180-94.130.1.aarch64", "product_id": "cluster-md-kmp-default-4.4.180-94.130.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.130.1.aarch64", "product": { "name": "dlm-kmp-default-4.4.180-94.130.1.aarch64", "product_id": "dlm-kmp-default-4.4.180-94.130.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.130.1.aarch64", "product": { "name": "gfs2-kmp-default-4.4.180-94.130.1.aarch64", "product_id": "gfs2-kmp-default-4.4.180-94.130.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.180-94.130.1.aarch64", "product": { "name": "kernel-default-4.4.180-94.130.1.aarch64", "product_id": "kernel-default-4.4.180-94.130.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.130.1.aarch64", "product": { "name": "kernel-default-base-4.4.180-94.130.1.aarch64", "product_id": "kernel-default-base-4.4.180-94.130.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.130.1.aarch64", "product": { "name": "kernel-default-devel-4.4.180-94.130.1.aarch64", "product_id": "kernel-default-devel-4.4.180-94.130.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.130.1.aarch64", "product": { "name": "kernel-default-extra-4.4.180-94.130.1.aarch64", "product_id": "kernel-default-extra-4.4.180-94.130.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.130.1.aarch64", "product": { "name": "kernel-default-kgraft-4.4.180-94.130.1.aarch64", "product_id": "kernel-default-kgraft-4.4.180-94.130.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.130.1.aarch64", "product": { "name": "kernel-obs-build-4.4.180-94.130.1.aarch64", "product_id": "kernel-obs-build-4.4.180-94.130.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.130.1.aarch64", "product": { "name": "kernel-obs-qa-4.4.180-94.130.1.aarch64", "product_id": "kernel-obs-qa-4.4.180-94.130.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.130.1.aarch64", "product": { "name": "kernel-syms-4.4.180-94.130.1.aarch64", "product_id": "kernel-syms-4.4.180-94.130.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.130.1.aarch64", "product": { "name": "kernel-vanilla-4.4.180-94.130.1.aarch64", "product_id": "kernel-vanilla-4.4.180-94.130.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.130.1.aarch64", "product": { "name": "kernel-vanilla-base-4.4.180-94.130.1.aarch64", "product_id": "kernel-vanilla-base-4.4.180-94.130.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.130.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.4.180-94.130.1.aarch64", "product_id": "kernel-vanilla-devel-4.4.180-94.130.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.130.1.aarch64", "product": { "name": "kselftests-kmp-default-4.4.180-94.130.1.aarch64", "product_id": "kselftests-kmp-default-4.4.180-94.130.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.130.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.4.180-94.130.1.aarch64", "product_id": "ocfs2-kmp-default-4.4.180-94.130.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.180-94.130.1.noarch", "product": { "name": "kernel-devel-4.4.180-94.130.1.noarch", "product_id": "kernel-devel-4.4.180-94.130.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.180-94.130.1.noarch", "product": { "name": "kernel-macros-4.4.180-94.130.1.noarch", "product_id": "kernel-macros-4.4.180-94.130.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.180-94.130.1.noarch", "product": { "name": "kernel-source-4.4.180-94.130.1.noarch", "product_id": "kernel-source-4.4.180-94.130.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.180-94.130.1.noarch", "product": { "name": "kernel-docs-4.4.180-94.130.1.noarch", "product_id": "kernel-docs-4.4.180-94.130.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.4.180-94.130.1.noarch", "product": { "name": "kernel-docs-html-4.4.180-94.130.1.noarch", "product_id": "kernel-docs-html-4.4.180-94.130.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.4.180-94.130.1.noarch", "product": { "name": "kernel-docs-pdf-4.4.180-94.130.1.noarch", "product_id": "kernel-docs-pdf-4.4.180-94.130.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.4.180-94.130.1.noarch", "product": { "name": "kernel-source-vanilla-4.4.180-94.130.1.noarch", "product_id": "kernel-source-vanilla-4.4.180-94.130.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.180-94.130.1.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.4.180-94.130.1.ppc64le", "product_id": "cluster-md-kmp-debug-4.4.180-94.130.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.130.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.180-94.130.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.180-94.130.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.180-94.130.1.ppc64le", "product": { "name": "dlm-kmp-debug-4.4.180-94.130.1.ppc64le", "product_id": "dlm-kmp-debug-4.4.180-94.130.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.130.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.180-94.130.1.ppc64le", "product_id": "dlm-kmp-default-4.4.180-94.130.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.180-94.130.1.ppc64le", "product": { "name": "gfs2-kmp-debug-4.4.180-94.130.1.ppc64le", "product_id": "gfs2-kmp-debug-4.4.180-94.130.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.130.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.180-94.130.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.180-94.130.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.4.180-94.130.1.ppc64le", "product": { "name": "kernel-debug-4.4.180-94.130.1.ppc64le", "product_id": "kernel-debug-4.4.180-94.130.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.180-94.130.1.ppc64le", "product": { "name": "kernel-debug-base-4.4.180-94.130.1.ppc64le", "product_id": "kernel-debug-base-4.4.180-94.130.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.180-94.130.1.ppc64le", "product": { "name": "kernel-debug-devel-4.4.180-94.130.1.ppc64le", "product_id": "kernel-debug-devel-4.4.180-94.130.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.180-94.130.1.ppc64le", "product": { "name": "kernel-debug-extra-4.4.180-94.130.1.ppc64le", "product_id": "kernel-debug-extra-4.4.180-94.130.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.180-94.130.1.ppc64le", "product": { "name": "kernel-debug-kgraft-4.4.180-94.130.1.ppc64le", "product_id": "kernel-debug-kgraft-4.4.180-94.130.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.180-94.130.1.ppc64le", "product": { "name": "kernel-default-4.4.180-94.130.1.ppc64le", "product_id": "kernel-default-4.4.180-94.130.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.130.1.ppc64le", "product": { "name": "kernel-default-base-4.4.180-94.130.1.ppc64le", "product_id": "kernel-default-base-4.4.180-94.130.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.130.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.180-94.130.1.ppc64le", "product_id": "kernel-default-devel-4.4.180-94.130.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.130.1.ppc64le", "product": { "name": "kernel-default-extra-4.4.180-94.130.1.ppc64le", "product_id": "kernel-default-extra-4.4.180-94.130.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "product_id": "kernel-default-kgraft-4.4.180-94.130.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.130.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.180-94.130.1.ppc64le", "product_id": "kernel-obs-build-4.4.180-94.130.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.130.1.ppc64le", "product": { "name": "kernel-obs-qa-4.4.180-94.130.1.ppc64le", "product_id": "kernel-obs-qa-4.4.180-94.130.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.130.1.ppc64le", "product": { "name": "kernel-syms-4.4.180-94.130.1.ppc64le", "product_id": "kernel-syms-4.4.180-94.130.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.130.1.ppc64le", "product": { "name": "kernel-vanilla-4.4.180-94.130.1.ppc64le", "product_id": "kernel-vanilla-4.4.180-94.130.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.130.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.4.180-94.130.1.ppc64le", "product_id": "kernel-vanilla-base-4.4.180-94.130.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.130.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.4.180-94.130.1.ppc64le", "product_id": "kernel-vanilla-devel-4.4.180-94.130.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "product": { "name": "kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "product_id": "kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.4.180-94.130.1.ppc64le", "product": { "name": "kselftests-kmp-debug-4.4.180-94.130.1.ppc64le", "product_id": "kselftests-kmp-debug-4.4.180-94.130.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.130.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.4.180-94.130.1.ppc64le", "product_id": "kselftests-kmp-default-4.4.180-94.130.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.180-94.130.1.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.4.180-94.130.1.ppc64le", "product_id": "ocfs2-kmp-debug-4.4.180-94.130.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.130.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.180-94.130.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.180-94.130.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.130.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.180-94.130.1.s390x", "product_id": "cluster-md-kmp-default-4.4.180-94.130.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.130.1.s390x", "product": { "name": "dlm-kmp-default-4.4.180-94.130.1.s390x", "product_id": "dlm-kmp-default-4.4.180-94.130.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.130.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.180-94.130.1.s390x", "product_id": "gfs2-kmp-default-4.4.180-94.130.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.180-94.130.1.s390x", "product": { "name": "kernel-default-4.4.180-94.130.1.s390x", "product_id": "kernel-default-4.4.180-94.130.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.130.1.s390x", "product": { "name": "kernel-default-base-4.4.180-94.130.1.s390x", "product_id": "kernel-default-base-4.4.180-94.130.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.130.1.s390x", "product": { "name": "kernel-default-devel-4.4.180-94.130.1.s390x", "product_id": "kernel-default-devel-4.4.180-94.130.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.130.1.s390x", "product": { "name": "kernel-default-extra-4.4.180-94.130.1.s390x", "product_id": "kernel-default-extra-4.4.180-94.130.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.130.1.s390x", "product": { "name": "kernel-default-kgraft-4.4.180-94.130.1.s390x", "product_id": "kernel-default-kgraft-4.4.180-94.130.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.180-94.130.1.s390x", "product": { "name": "kernel-default-man-4.4.180-94.130.1.s390x", "product_id": "kernel-default-man-4.4.180-94.130.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.130.1.s390x", "product": { "name": "kernel-obs-build-4.4.180-94.130.1.s390x", "product_id": "kernel-obs-build-4.4.180-94.130.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.130.1.s390x", "product": { "name": "kernel-obs-qa-4.4.180-94.130.1.s390x", "product_id": "kernel-obs-qa-4.4.180-94.130.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.130.1.s390x", "product": { "name": "kernel-syms-4.4.180-94.130.1.s390x", "product_id": "kernel-syms-4.4.180-94.130.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.130.1.s390x", "product": { "name": "kernel-vanilla-4.4.180-94.130.1.s390x", "product_id": "kernel-vanilla-4.4.180-94.130.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.130.1.s390x", "product": { "name": "kernel-vanilla-base-4.4.180-94.130.1.s390x", "product_id": "kernel-vanilla-base-4.4.180-94.130.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.130.1.s390x", "product": { "name": "kernel-vanilla-devel-4.4.180-94.130.1.s390x", "product_id": "kernel-vanilla-devel-4.4.180-94.130.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.4.180-94.130.1.s390x", "product": { "name": "kernel-zfcpdump-4.4.180-94.130.1.s390x", "product_id": "kernel-zfcpdump-4.4.180-94.130.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.130.1.s390x", "product": { "name": "kselftests-kmp-default-4.4.180-94.130.1.s390x", "product_id": "kselftests-kmp-default-4.4.180-94.130.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.130.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.180-94.130.1.s390x", "product_id": "ocfs2-kmp-default-4.4.180-94.130.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.180-94.130.1.x86_64", "product": { "name": "kernel-default-4.4.180-94.130.1.x86_64", "product_id": "kernel-default-4.4.180-94.130.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.130.1.x86_64", "product": { "name": "kernel-default-base-4.4.180-94.130.1.x86_64", "product_id": "kernel-default-base-4.4.180-94.130.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.130.1.x86_64", "product": { "name": "kernel-default-devel-4.4.180-94.130.1.x86_64", "product_id": "kernel-default-devel-4.4.180-94.130.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.130.1.x86_64", "product": { "name": "kernel-default-kgraft-4.4.180-94.130.1.x86_64", "product_id": "kernel-default-kgraft-4.4.180-94.130.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.130.1.x86_64", "product": { "name": "kernel-syms-4.4.180-94.130.1.x86_64", "product_id": "kernel-syms-4.4.180-94.130.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "product": { "name": "kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "product_id": "kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.180-94.130.1.x86_64", "product": { "name": "cluster-md-kmp-debug-4.4.180-94.130.1.x86_64", "product_id": "cluster-md-kmp-debug-4.4.180-94.130.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.130.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.180-94.130.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.180-94.130.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.180-94.130.1.x86_64", "product": { "name": "dlm-kmp-debug-4.4.180-94.130.1.x86_64", "product_id": "dlm-kmp-debug-4.4.180-94.130.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.130.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.180-94.130.1.x86_64", "product_id": "dlm-kmp-default-4.4.180-94.130.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.180-94.130.1.x86_64", "product": { "name": "gfs2-kmp-debug-4.4.180-94.130.1.x86_64", "product_id": "gfs2-kmp-debug-4.4.180-94.130.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.130.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.180-94.130.1.x86_64", "product_id": "gfs2-kmp-default-4.4.180-94.130.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.4.180-94.130.1.x86_64", "product": { "name": "kernel-debug-4.4.180-94.130.1.x86_64", "product_id": "kernel-debug-4.4.180-94.130.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.180-94.130.1.x86_64", "product": { "name": "kernel-debug-base-4.4.180-94.130.1.x86_64", "product_id": "kernel-debug-base-4.4.180-94.130.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.180-94.130.1.x86_64", "product": { "name": "kernel-debug-devel-4.4.180-94.130.1.x86_64", "product_id": "kernel-debug-devel-4.4.180-94.130.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.180-94.130.1.x86_64", "product": { "name": "kernel-debug-extra-4.4.180-94.130.1.x86_64", "product_id": "kernel-debug-extra-4.4.180-94.130.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.180-94.130.1.x86_64", "product": { "name": "kernel-debug-kgraft-4.4.180-94.130.1.x86_64", "product_id": "kernel-debug-kgraft-4.4.180-94.130.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.130.1.x86_64", "product": { "name": "kernel-default-extra-4.4.180-94.130.1.x86_64", "product_id": "kernel-default-extra-4.4.180-94.130.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.130.1.x86_64", "product": { "name": "kernel-obs-build-4.4.180-94.130.1.x86_64", "product_id": "kernel-obs-build-4.4.180-94.130.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.130.1.x86_64", "product": { "name": "kernel-obs-qa-4.4.180-94.130.1.x86_64", "product_id": "kernel-obs-qa-4.4.180-94.130.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.130.1.x86_64", "product": { "name": "kernel-vanilla-4.4.180-94.130.1.x86_64", "product_id": "kernel-vanilla-4.4.180-94.130.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.130.1.x86_64", "product": { "name": "kernel-vanilla-base-4.4.180-94.130.1.x86_64", "product_id": "kernel-vanilla-base-4.4.180-94.130.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.130.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.4.180-94.130.1.x86_64", "product_id": "kernel-vanilla-devel-4.4.180-94.130.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.4.180-94.130.1.x86_64", "product": { "name": "kselftests-kmp-debug-4.4.180-94.130.1.x86_64", "product_id": "kselftests-kmp-debug-4.4.180-94.130.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.130.1.x86_64", "product": { "name": "kselftests-kmp-default-4.4.180-94.130.1.x86_64", "product_id": "kselftests-kmp-default-4.4.180-94.130.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.180-94.130.1.x86_64", "product": { "name": "ocfs2-kmp-debug-4.4.180-94.130.1.x86_64", "product_id": "ocfs2-kmp-debug-4.4.180-94.130.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.130.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.180-94.130.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.180-94.130.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "HPE Helion OpenStack 8", "product": { "name": "HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8", "product_identification_helper": { "cpe": "cpe:/o:suse:hpe-helion-openstack:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 8", "product": { "name": "SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 8", "product": { "name": "SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp3" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 5", "product": { "name": "SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.130.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.130.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.130.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.130.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.130.1.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.130.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.130.1.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.130.1.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.130.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.130.1.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.130.1.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-source-4.4.180-94.130.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.130.1.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.130.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.130.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.130.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.130.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.130.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.130.1.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.130.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.130.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.130.1.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.130.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.130.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.130.1.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.130.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.130.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.130.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.130.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.130.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.130.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.130.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.130.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.130.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.130.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.130.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.130.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.130.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.130.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.130.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.130.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.130.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.180-94.130.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.4.180-94.130.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.180-94.130.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.4.180-94.130.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.180-94.130.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.180-94.130.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.4.180-94.130.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.180-94.130.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.s390x" }, "product_reference": "dlm-kmp-default-4.4.180-94.130.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.180-94.130.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.x86_64" }, "product_reference": "dlm-kmp-default-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.180-94.130.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.4.180-94.130.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.180-94.130.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.s390x" }, "product_reference": "gfs2-kmp-default-4.4.180-94.130.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.180-94.130.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.180-94.130.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.4.180-94.130.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.180-94.130.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.4.180-94.130.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.180-94.130.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.130.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.ppc64le" }, "product_reference": "kernel-default-4.4.180-94.130.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.130.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.130.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.180-94.130.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.130.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.130.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.180-94.130.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.130.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.130.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.130.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.130.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.130.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.130.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.130.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.130.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.130.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.130.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.130.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.130.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.130.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.ppc64le" }, "product_reference": "kernel-syms-4.4.180-94.130.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.130.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.130.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.aarch64" }, "product_reference": "kernel-default-4.4.180-94.130.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.130.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.ppc64le" }, "product_reference": "kernel-default-4.4.180-94.130.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.130.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.s390x" }, "product_reference": "kernel-default-4.4.180-94.130.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.130.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.130.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.aarch64" }, "product_reference": "kernel-default-base-4.4.180-94.130.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.130.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.180-94.130.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.130.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.s390x" }, "product_reference": "kernel-default-base-4.4.180-94.130.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.130.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.130.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.180-94.130.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.130.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.180-94.130.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.130.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.s390x" }, "product_reference": "kernel-default-devel-4.4.180-94.130.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.130.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.130.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.130.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.180-94.130.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.130.1.s390x" }, "product_reference": "kernel-default-man-4.4.180-94.130.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.130.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.130.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.130.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.130.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.130.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.130.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.130.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.130.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.130.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.130.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.aarch64" }, "product_reference": "kernel-syms-4.4.180-94.130.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.130.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.ppc64le" }, "product_reference": "kernel-syms-4.4.180-94.130.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.130.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.s390x" }, "product_reference": "kernel-syms-4.4.180-94.130.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.130.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.130.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.130.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.130.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.130.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.130.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.130.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.130.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.130.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.130.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.130.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.130.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.130.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.130.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.130.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.aarch64" }, "product_reference": "kernel-default-4.4.180-94.130.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.130.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.130.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.aarch64" }, "product_reference": "kernel-default-base-4.4.180-94.130.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.130.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.130.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.180-94.130.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.130.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.130.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.130.1.noarch as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.130.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.130.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.130.1.noarch as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.130.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.130.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.130.1.noarch as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.130.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.130.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.130.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.aarch64" }, "product_reference": "kernel-syms-4.4.180-94.130.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.130.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.130.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-09T13:26:22Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2020-14314", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14314" } ], "notes": [ { "category": "general", "text": "A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14314", "url": "https://www.suse.com/security/cve/CVE-2020-14314" }, { "category": "external", "summary": "SUSE Bug 1173798 for CVE-2020-14314", "url": "https://bugzilla.suse.com/1173798" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-09T13:26:22Z", "details": "moderate" } ], "title": "CVE-2020-14314" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-09T13:26:22Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14386" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14386", "url": "https://www.suse.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "SUSE Bug 1176069 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176069" }, { "category": "external", "summary": "SUSE Bug 1176072 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-09T13:26:22Z", "details": "important" } ], "title": "CVE-2020-14386" }, { "cve": "CVE-2020-16166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16166" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16166", "url": "https://www.suse.com/security/cve/CVE-2020-16166" }, { "category": "external", "summary": "SUSE Bug 1174757 for CVE-2020-16166", "url": "https://bugzilla.suse.com/1174757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.130.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.130.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.130.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.130.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.130.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_130-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-09T13:26:22Z", "details": "moderate" } ], "title": "CVE-2020-16166" } ] }
suse-su-2020:2524-1
Vulnerability from csaf_suse
Published
2020-09-04 11:33
Modified
2020-09-04 11:33
Summary
Security update for the Linux Kernel (Live Patch 18 for SLE 15)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 18 for SLE 15)
Description of the patch
This update for the Linux Kernel 4.12.14-150_52 fixes several issues.
The following security issues were fixed:
- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2020-15780: Fixed a lockdown bypass via injection of malicious ACPI tables via configfs (bsc#1174186).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2020-1749: Fixed a flaw in IPsec where some IPv6 protocols were not encrypted (bsc#1165631).
Patchnames
SUSE-2020-2524,SUSE-SLE-Module-Live-Patching-15-2020-2524
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 18 for SLE 15)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-150_52 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).\n- CVE-2020-15780: Fixed a lockdown bypass via injection of malicious ACPI tables via configfs (bsc#1174186).\n- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).\n- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).\n- CVE-2020-1749: Fixed a flaw in IPsec where some IPv6 protocols were not encrypted (bsc#1165631).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2524,SUSE-SLE-Module-Live-Patching-15-2020-2524", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2524-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2524-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202524-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2524-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007358.html" }, { "category": "self", "summary": "SUSE Bug 1165631", "url": "https://bugzilla.suse.com/1165631" }, { "category": "self", "summary": "SUSE Bug 1173659", "url": "https://bugzilla.suse.com/1173659" }, { "category": "self", "summary": "SUSE Bug 1173942", "url": "https://bugzilla.suse.com/1173942" }, { "category": "self", "summary": "SUSE Bug 1174186", "url": "https://bugzilla.suse.com/1174186" }, { "category": "self", "summary": "SUSE Bug 1174247", "url": "https://bugzilla.suse.com/1174247" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11668 page", "url": "https://www.suse.com/security/cve/CVE-2020-11668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1749 page", "url": "https://www.suse.com/security/cve/CVE-2020-1749/" } ], "title": "Security update for the Linux Kernel (Live Patch 18 for SLE 15)", "tracking": { "current_release_date": "2020-09-04T11:33:20Z", "generator": { "date": "2020-09-04T11:33:20Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2524-1", "initial_release_date": "2020-09-04T11:33:20Z", "revision_history": [ { "date": "2020-09-04T11:33:20Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_52-default-2-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_52-default-2-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_52-default-2-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_52-default-2-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_52-default-2-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-150_52-default-2-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_52-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_52-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_52-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_52-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:20Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2020-11668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11668" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11668", "url": "https://www.suse.com/security/cve/CVE-2020-11668" }, { "category": "external", "summary": "SUSE Bug 1168952 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1168952" }, { "category": "external", "summary": "SUSE Bug 1173942 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1173942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:20Z", "details": "important" } ], "title": "CVE-2020-11668" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:20Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:20Z", "details": "important" } ], "title": "CVE-2020-15780" }, { "cve": "CVE-2020-1749", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1749" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1749", "url": "https://www.suse.com/security/cve/CVE-2020-1749" }, { "category": "external", "summary": "SUSE Bug 1165629 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165629" }, { "category": "external", "summary": "SUSE Bug 1165631 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165631" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177513" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1189302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:20Z", "details": "important" } ], "title": "CVE-2020-1749" } ] }
suse-su-2020:2526-1
Vulnerability from csaf_suse
Published
2020-09-04 11:33
Modified
2020-09-04 11:33
Summary
Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP1)
Description of the patch
This update for the Linux Kernel 4.12.14-197_18 fixes several issues.
The following security issues were fixed:
- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2020-15780: Fixed a lockdown bypass via injection of malicious ACPI tables via configfs (bsc#1174186).
- CVE-2019-0155: Fixed a privilege escalation in the i915 graphics driver (bsc#1173663).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2019-15117: Fixed an OOB memory access in the USB sound mixer (bsc#1173934).
- CVE-2019-19447: Fixed a use-after-free in ext4_put_super (bsc#1173869).
- CVE-2019-14901: Fixed a heap overflow in the Marvell WiFi driver (bsc#1173661).
- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173100).
Patchnames
SUSE-2020-2526,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2526
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-197_18 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).\n- CVE-2020-15780: Fixed a lockdown bypass via injection of malicious ACPI tables via configfs (bsc#1174186).\n- CVE-2019-0155: Fixed a privilege escalation in the i915 graphics driver (bsc#1173663).\n- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).\n- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).\n- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).\n- CVE-2019-15117: Fixed an OOB memory access in the USB sound mixer (bsc#1173934).\n- CVE-2019-19447: Fixed a use-after-free in ext4_put_super (bsc#1173869).\n- CVE-2019-14901: Fixed a heap overflow in the Marvell WiFi driver (bsc#1173661).\n- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173100).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2526,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2526", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2526-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2526-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202526-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2526-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" }, { "category": "self", "summary": "SUSE Bug 1173100", "url": "https://bugzilla.suse.com/1173100" }, { "category": "self", "summary": "SUSE Bug 1173659", "url": "https://bugzilla.suse.com/1173659" }, { "category": "self", "summary": "SUSE Bug 1173661", "url": "https://bugzilla.suse.com/1173661" }, { "category": "self", "summary": "SUSE Bug 1173663", "url": "https://bugzilla.suse.com/1173663" }, { "category": "self", "summary": "SUSE Bug 1173869", "url": "https://bugzilla.suse.com/1173869" }, { "category": "self", "summary": "SUSE Bug 1173934", "url": "https://bugzilla.suse.com/1173934" }, { "category": "self", "summary": "SUSE Bug 1173942", "url": "https://bugzilla.suse.com/1173942" }, { "category": "self", "summary": "SUSE Bug 1173963", "url": "https://bugzilla.suse.com/1173963" }, { "category": "self", "summary": "SUSE Bug 1174186", "url": "https://bugzilla.suse.com/1174186" }, { "category": "self", "summary": "SUSE Bug 1174247", "url": "https://bugzilla.suse.com/1174247" }, { "category": "self", "summary": "SUSE CVE CVE-2019-0155 page", "url": "https://www.suse.com/security/cve/CVE-2019-0155/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14895 page", "url": "https://www.suse.com/security/cve/CVE-2019-14895/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14901 page", "url": "https://www.suse.com/security/cve/CVE-2019-14901/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15117 page", "url": "https://www.suse.com/security/cve/CVE-2019-15117/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19447 page", "url": "https://www.suse.com/security/cve/CVE-2019-19447/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9458 page", "url": "https://www.suse.com/security/cve/CVE-2019-9458/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11668 page", "url": "https://www.suse.com/security/cve/CVE-2020-11668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" } ], "title": "Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP1)", "tracking": { "current_release_date": "2020-09-04T11:33:34Z", "generator": { "date": "2020-09-04T11:33:34Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2526-1", "initial_release_date": "2020-09-04T11:33:34Z", "revision_history": [ { "date": "2020-09-04T11:33:34Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0155", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-0155" } ], "notes": [ { "category": "general", "text": "Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-0155", "url": "https://www.suse.com/security/cve/CVE-2019-0155" }, { "category": "external", "summary": "SUSE Bug 1135966 for CVE-2019-0155", "url": "https://bugzilla.suse.com/1135966" }, { "category": "external", "summary": "SUSE Bug 1135967 for CVE-2019-0155", "url": "https://bugzilla.suse.com/1135967" }, { "category": "external", "summary": "SUSE Bug 1173663 for CVE-2019-0155", "url": "https://bugzilla.suse.com/1173663" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:34Z", "details": "important" } ], "title": "CVE-2019-0155" }, { "cve": "CVE-2019-14895", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14895" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14895", "url": "https://www.suse.com/security/cve/CVE-2019-14895" }, { "category": "external", "summary": "SUSE Bug 1157042 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1157042" }, { "category": "external", "summary": "SUSE Bug 1157158 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1157158" }, { "category": "external", "summary": "SUSE Bug 1173100 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1173100" }, { "category": "external", "summary": "SUSE Bug 1173660 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1173660" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:34Z", "details": "important" } ], "title": "CVE-2019-14895" }, { "cve": "CVE-2019-14901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14901" } ], "notes": [ { "category": "general", "text": "A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14901", "url": "https://www.suse.com/security/cve/CVE-2019-14901" }, { "category": "external", "summary": "SUSE Bug 1157042 for CVE-2019-14901", "url": "https://bugzilla.suse.com/1157042" }, { "category": "external", "summary": "SUSE Bug 1173661 for CVE-2019-14901", "url": "https://bugzilla.suse.com/1173661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:34Z", "details": "important" } ], "title": "CVE-2019-14901" }, { "cve": "CVE-2019-15117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15117" } ], "notes": [ { "category": "general", "text": "parse_audio_mixer_unit in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles a short descriptor, leading to out-of-bounds memory access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15117", "url": "https://www.suse.com/security/cve/CVE-2019-15117" }, { "category": "external", "summary": "SUSE Bug 1145920 for CVE-2019-15117", "url": "https://bugzilla.suse.com/1145920" }, { "category": "external", "summary": "SUSE Bug 1173934 for CVE-2019-15117", "url": "https://bugzilla.suse.com/1173934" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:34Z", "details": "important" } ], "title": "CVE-2019-15117" }, { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:34Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2019-19447", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19447" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19447", "url": "https://www.suse.com/security/cve/CVE-2019-19447" }, { "category": "external", "summary": "SUSE Bug 1158819 for CVE-2019-19447", "url": "https://bugzilla.suse.com/1158819" }, { "category": "external", "summary": "SUSE Bug 1173869 for CVE-2019-19447", "url": "https://bugzilla.suse.com/1173869" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:34Z", "details": "important" } ], "title": "CVE-2019-19447" }, { "cve": "CVE-2019-9458", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9458" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9458", "url": "https://www.suse.com/security/cve/CVE-2019-9458" }, { "category": "external", "summary": "SUSE Bug 1168295 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1168295" }, { "category": "external", "summary": "SUSE Bug 1173963 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1173963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:34Z", "details": "important" } ], "title": "CVE-2019-9458" }, { "cve": "CVE-2020-11668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11668" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11668", "url": "https://www.suse.com/security/cve/CVE-2020-11668" }, { "category": "external", "summary": "SUSE Bug 1168952 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1168952" }, { "category": "external", "summary": "SUSE Bug 1173942 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1173942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:34Z", "details": "important" } ], "title": "CVE-2020-11668" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:34Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_18-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:34Z", "details": "important" } ], "title": "CVE-2020-15780" } ] }
suse-su-2020:2507-1
Vulnerability from csaf_suse
Published
2020-09-04 11:31
Modified
2020-09-04 11:31
Summary
Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP4)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP4)
Description of the patch
This update for the Linux Kernel 4.12.14-95_48 fixes several issues.
The following security issues were fixed:
- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2020-15780: Fixed a lockdown bypass via injection of malicious ACPI tables via configfs (bsc#1174186).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
Patchnames
SUSE-2020-2507,SUSE-SLE-Live-Patching-12-SP4-2020-2507
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP4)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-95_48 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).\n- CVE-2020-15780: Fixed a lockdown bypass via injection of malicious ACPI tables via configfs (bsc#1174186).\n- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).\n- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).\n- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2507,SUSE-SLE-Live-Patching-12-SP4-2020-2507", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2507-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2507-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202507-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2507-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007357.html" }, { "category": "self", "summary": "SUSE Bug 1173659", "url": "https://bugzilla.suse.com/1173659" }, { "category": "self", "summary": "SUSE Bug 1173942", "url": "https://bugzilla.suse.com/1173942" }, { "category": "self", "summary": "SUSE Bug 1173963", "url": "https://bugzilla.suse.com/1173963" }, { "category": "self", "summary": "SUSE Bug 1174186", "url": "https://bugzilla.suse.com/1174186" }, { "category": "self", "summary": "SUSE Bug 1174247", "url": "https://bugzilla.suse.com/1174247" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9458 page", "url": "https://www.suse.com/security/cve/CVE-2019-9458/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11668 page", "url": "https://www.suse.com/security/cve/CVE-2020-11668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" } ], "title": "Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP4)", "tracking": { "current_release_date": "2020-09-04T11:31:05Z", "generator": { "date": "2020-09-04T11:31:05Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2507-1", "initial_release_date": "2020-09-04T11:31:05Z", "revision_history": [ { "date": "2020-09-04T11:31:05Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_48-default-5-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_48-default-5-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-95_48-default-5-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_48-default-5-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_48-default-5-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-95_48-default-5-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_48-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_48-default-5-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_48-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_48-default-5-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:31:05Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2019-9458", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9458" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9458", "url": "https://www.suse.com/security/cve/CVE-2019-9458" }, { "category": "external", "summary": "SUSE Bug 1168295 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1168295" }, { "category": "external", "summary": "SUSE Bug 1173963 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1173963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:31:05Z", "details": "important" } ], "title": "CVE-2019-9458" }, { "cve": "CVE-2020-11668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11668" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11668", "url": "https://www.suse.com/security/cve/CVE-2020-11668" }, { "category": "external", "summary": "SUSE Bug 1168952 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1168952" }, { "category": "external", "summary": "SUSE Bug 1173942 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1173942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:31:05Z", "details": "important" } ], "title": "CVE-2020-11668" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:31:05Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:31:05Z", "details": "important" } ], "title": "CVE-2020-15780" } ] }
suse-su-2020:2525-1
Vulnerability from csaf_suse
Published
2020-09-04 11:33
Modified
2020-09-04 11:33
Summary
Security update for the Linux Kernel (Live Patch 19 for SLE 15)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 19 for SLE 15)
Description of the patch
This update for the Linux Kernel 4.12.14-150_55 fixes several issues.
The following security issues were fixed:
- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2020-1749: Fixed a flaw in IPsec where some IPv6 protocols were not encrypted (bsc#1165631).
Patchnames
SUSE-2020-2525,SUSE-SLE-Module-Live-Patching-15-2020-2525
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 19 for SLE 15)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-150_55 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).\n- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).\n- CVE-2020-1749: Fixed a flaw in IPsec where some IPv6 protocols were not encrypted (bsc#1165631).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2525,SUSE-SLE-Module-Live-Patching-15-2020-2525", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2525-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2525-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202525-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2525-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007354.html" }, { "category": "self", "summary": "SUSE Bug 1165631", "url": "https://bugzilla.suse.com/1165631" }, { "category": "self", "summary": "SUSE Bug 1173942", "url": "https://bugzilla.suse.com/1173942" }, { "category": "self", "summary": "SUSE Bug 1174247", "url": "https://bugzilla.suse.com/1174247" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11668 page", "url": "https://www.suse.com/security/cve/CVE-2020-11668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1749 page", "url": "https://www.suse.com/security/cve/CVE-2020-1749/" } ], "title": "Security update for the Linux Kernel (Live Patch 19 for SLE 15)", "tracking": { "current_release_date": "2020-09-04T11:33:27Z", "generator": { "date": "2020-09-04T11:33:27Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2525-1", "initial_release_date": "2020-09-04T11:33:27Z", "revision_history": [ { "date": "2020-09-04T11:33:27Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_55-default-2-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_55-default-2-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_55-default-2-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_55-default-2-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_55-default-2-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-150_55-default-2-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_55-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-2-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_55-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_55-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-2-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_55-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-11668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11668" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11668", "url": "https://www.suse.com/security/cve/CVE-2020-11668" }, { "category": "external", "summary": "SUSE Bug 1168952 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1168952" }, { "category": "external", "summary": "SUSE Bug 1173942 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1173942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:27Z", "details": "important" } ], "title": "CVE-2020-11668" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:27Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-1749", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1749" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1749", "url": "https://www.suse.com/security/cve/CVE-2020-1749" }, { "category": "external", "summary": "SUSE Bug 1165629 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165629" }, { "category": "external", "summary": "SUSE Bug 1165631 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165631" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177513" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1189302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:27Z", "details": "important" } ], "title": "CVE-2020-1749" } ] }
suse-su-2020:2576-1
Vulnerability from csaf_suse
Published
2020-09-09 05:17
Modified
2020-09-09 05:17
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP2 kernel was updated to to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).
- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).
- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).
- CVE-2019-16746: Fixed an improper check of the length of variable elements in a beacon head, leading to a buffer overflow (bsc#1152107).
- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).
The following non-security bug was fixed:
- mm, vmstat: reduce zone->lock holding time by /proc/pagetypeinfo (bsc#1175691).
Patchnames
SUSE-2020-2576,SUSE-OpenStack-Cloud-7-2020-2576,SUSE-SLE-HA-12-SP2-2020-2576,SUSE-SLE-SAP-12-SP2-2020-2576,SUSE-SLE-SERVER-12-SP2-2020-2576,SUSE-SLE-SERVER-12-SP2-BCL-2020-2576
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP2 kernel was updated to to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n\n- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).\n- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).\n- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).\n- CVE-2019-16746: Fixed an improper check of the length of variable elements in a beacon head, leading to a buffer overflow (bsc#1152107).\n- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).\n\nThe following non-security bug was fixed:\n\n- mm, vmstat: reduce zone-\u003elock holding time by /proc/pagetypeinfo (bsc#1175691).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2576,SUSE-OpenStack-Cloud-7-2020-2576,SUSE-SLE-HA-12-SP2-2020-2576,SUSE-SLE-SAP-12-SP2-2020-2576,SUSE-SLE-SERVER-12-SP2-2020-2576,SUSE-SLE-SERVER-12-SP2-BCL-2020-2576", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2576-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2576-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202576-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2576-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007384.html" }, { "category": "self", "summary": "SUSE Bug 1152107", "url": "https://bugzilla.suse.com/1152107" }, { "category": "self", "summary": "SUSE Bug 1173798", "url": "https://bugzilla.suse.com/1173798" }, { "category": "self", "summary": "SUSE Bug 1174205", "url": "https://bugzilla.suse.com/1174205" }, { "category": "self", "summary": "SUSE Bug 1174757", "url": "https://bugzilla.suse.com/1174757" }, { "category": "self", "summary": "SUSE Bug 1175691", "url": "https://bugzilla.suse.com/1175691" }, { "category": "self", "summary": "SUSE Bug 1176069", "url": "https://bugzilla.suse.com/1176069" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14314 page", "url": "https://www.suse.com/security/cve/CVE-2020-14314/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14386 page", "url": "https://www.suse.com/security/cve/CVE-2020-14386/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16166 page", "url": "https://www.suse.com/security/cve/CVE-2020-16166/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-09-09T05:17:13Z", "generator": { "date": "2020-09-09T05:17:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2576-1", "initial_release_date": "2020-09-09T05:17:13Z", "revision_history": [ { "date": "2020-09-09T05:17:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.141.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.141.1.aarch64", "product_id": "cluster-md-kmp-default-4.4.121-92.141.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.141.1.aarch64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.141.1.aarch64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.141.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.141.1.aarch64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.141.1.aarch64", "product_id": "cluster-network-kmp-default-4.4.121-92.141.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.141.1.aarch64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.141.1.aarch64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.141.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.141.1.aarch64", "product": { "name": "dlm-kmp-default-4.4.121-92.141.1.aarch64", "product_id": "dlm-kmp-default-4.4.121-92.141.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.141.1.aarch64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.141.1.aarch64", "product_id": "dlm-kmp-vanilla-4.4.121-92.141.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.141.1.aarch64", "product": { "name": "gfs2-kmp-default-4.4.121-92.141.1.aarch64", "product_id": "gfs2-kmp-default-4.4.121-92.141.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.141.1.aarch64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.141.1.aarch64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.141.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.141.1.aarch64", "product": { "name": "kernel-default-4.4.121-92.141.1.aarch64", "product_id": "kernel-default-4.4.121-92.141.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.141.1.aarch64", "product": { "name": "kernel-default-base-4.4.121-92.141.1.aarch64", "product_id": "kernel-default-base-4.4.121-92.141.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.141.1.aarch64", "product": { "name": "kernel-default-devel-4.4.121-92.141.1.aarch64", "product_id": "kernel-default-devel-4.4.121-92.141.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.141.1.aarch64", "product": { "name": "kernel-default-extra-4.4.121-92.141.1.aarch64", "product_id": "kernel-default-extra-4.4.121-92.141.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.141.1.aarch64", "product": { "name": "kernel-default-kgraft-4.4.121-92.141.1.aarch64", "product_id": "kernel-default-kgraft-4.4.121-92.141.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.141.1.aarch64", "product": { "name": "kernel-obs-build-4.4.121-92.141.1.aarch64", "product_id": "kernel-obs-build-4.4.121-92.141.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.141.1.aarch64", "product": { "name": "kernel-obs-qa-4.4.121-92.141.1.aarch64", "product_id": "kernel-obs-qa-4.4.121-92.141.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.141.1.aarch64", "product": { "name": "kernel-syms-4.4.121-92.141.1.aarch64", "product_id": "kernel-syms-4.4.121-92.141.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.141.1.aarch64", "product": { "name": "kernel-vanilla-4.4.121-92.141.1.aarch64", "product_id": "kernel-vanilla-4.4.121-92.141.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.141.1.aarch64", "product": { "name": "kernel-vanilla-base-4.4.121-92.141.1.aarch64", "product_id": "kernel-vanilla-base-4.4.121-92.141.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.141.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.141.1.aarch64", "product_id": "kernel-vanilla-devel-4.4.121-92.141.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.141.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.141.1.aarch64", "product_id": "ocfs2-kmp-default-4.4.121-92.141.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.141.1.aarch64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.141.1.aarch64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.141.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.121-92.141.1.noarch", "product": { "name": "kernel-devel-4.4.121-92.141.1.noarch", "product_id": "kernel-devel-4.4.121-92.141.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.121-92.141.1.noarch", "product": { "name": "kernel-docs-4.4.121-92.141.1.noarch", "product_id": "kernel-docs-4.4.121-92.141.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.4.121-92.141.1.noarch", "product": { "name": "kernel-docs-html-4.4.121-92.141.1.noarch", "product_id": "kernel-docs-html-4.4.121-92.141.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.4.121-92.141.1.noarch", "product": { "name": "kernel-docs-pdf-4.4.121-92.141.1.noarch", "product_id": "kernel-docs-pdf-4.4.121-92.141.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.121-92.141.1.noarch", "product": { "name": "kernel-macros-4.4.121-92.141.1.noarch", "product_id": "kernel-macros-4.4.121-92.141.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.121-92.141.1.noarch", "product": { "name": "kernel-source-4.4.121-92.141.1.noarch", "product_id": "kernel-source-4.4.121-92.141.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.4.121-92.141.1.noarch", "product": { "name": "kernel-source-vanilla-4.4.121-92.141.1.noarch", "product_id": "kernel-source-vanilla-4.4.121-92.141.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.141.1.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.141.1.ppc64le", "product_id": "cluster-md-kmp-debug-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.141.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.121-92.141.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.141.1.ppc64le", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.141.1.ppc64le", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.141.1.ppc64le", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.141.1.ppc64le", "product_id": "cluster-network-kmp-debug-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.141.1.ppc64le", "product": { "name": "cluster-network-kmp-default-4.4.121-92.141.1.ppc64le", "product_id": "cluster-network-kmp-default-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.141.1.ppc64le", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.141.1.ppc64le", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.141.1.ppc64le", "product": { "name": "dlm-kmp-debug-4.4.121-92.141.1.ppc64le", "product_id": "dlm-kmp-debug-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.141.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.121-92.141.1.ppc64le", "product_id": "dlm-kmp-default-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.141.1.ppc64le", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.141.1.ppc64le", "product_id": "dlm-kmp-vanilla-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.141.1.ppc64le", "product": { "name": "gfs2-kmp-debug-4.4.121-92.141.1.ppc64le", "product_id": "gfs2-kmp-debug-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.141.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.121-92.141.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.141.1.ppc64le", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.141.1.ppc64le", "product_id": "gfs2-kmp-vanilla-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.141.1.ppc64le", "product": { "name": "kernel-debug-4.4.121-92.141.1.ppc64le", "product_id": "kernel-debug-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.141.1.ppc64le", "product": { "name": "kernel-debug-base-4.4.121-92.141.1.ppc64le", "product_id": "kernel-debug-base-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.141.1.ppc64le", "product": { "name": "kernel-debug-devel-4.4.121-92.141.1.ppc64le", "product_id": "kernel-debug-devel-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.141.1.ppc64le", "product": { "name": "kernel-debug-extra-4.4.121-92.141.1.ppc64le", "product_id": "kernel-debug-extra-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.141.1.ppc64le", "product": { "name": "kernel-debug-kgraft-4.4.121-92.141.1.ppc64le", "product_id": "kernel-debug-kgraft-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.141.1.ppc64le", "product": { "name": "kernel-default-4.4.121-92.141.1.ppc64le", "product_id": "kernel-default-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.141.1.ppc64le", "product": { "name": "kernel-default-base-4.4.121-92.141.1.ppc64le", "product_id": "kernel-default-base-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.141.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.121-92.141.1.ppc64le", "product_id": "kernel-default-devel-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.141.1.ppc64le", "product": { "name": "kernel-default-extra-4.4.121-92.141.1.ppc64le", "product_id": "kernel-default-extra-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.141.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.4.121-92.141.1.ppc64le", "product_id": "kernel-default-kgraft-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.141.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.121-92.141.1.ppc64le", "product_id": "kernel-obs-build-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.141.1.ppc64le", "product": { "name": "kernel-obs-qa-4.4.121-92.141.1.ppc64le", "product_id": "kernel-obs-qa-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.141.1.ppc64le", "product": { "name": "kernel-syms-4.4.121-92.141.1.ppc64le", "product_id": "kernel-syms-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.141.1.ppc64le", "product": { "name": "kernel-vanilla-4.4.121-92.141.1.ppc64le", "product_id": "kernel-vanilla-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.141.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.4.121-92.141.1.ppc64le", "product_id": "kernel-vanilla-base-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.141.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.4.121-92.141.1.ppc64le", "product_id": "kernel-vanilla-devel-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "product": { "name": "kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "product_id": "kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.141.1.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.141.1.ppc64le", "product_id": "ocfs2-kmp-debug-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.141.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.121-92.141.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.121-92.141.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.141.1.ppc64le", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.141.1.ppc64le", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.141.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.141.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.121-92.141.1.s390x", "product_id": "cluster-md-kmp-default-4.4.121-92.141.1.s390x" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.141.1.s390x", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.141.1.s390x", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.141.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.141.1.s390x", "product": { "name": "cluster-network-kmp-default-4.4.121-92.141.1.s390x", "product_id": "cluster-network-kmp-default-4.4.121-92.141.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.141.1.s390x", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.141.1.s390x", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.141.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.141.1.s390x", "product": { "name": "dlm-kmp-default-4.4.121-92.141.1.s390x", "product_id": "dlm-kmp-default-4.4.121-92.141.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.141.1.s390x", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.141.1.s390x", "product_id": "dlm-kmp-vanilla-4.4.121-92.141.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.141.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.121-92.141.1.s390x", "product_id": "gfs2-kmp-default-4.4.121-92.141.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.141.1.s390x", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.141.1.s390x", "product_id": "gfs2-kmp-vanilla-4.4.121-92.141.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.141.1.s390x", "product": { "name": "kernel-default-4.4.121-92.141.1.s390x", "product_id": "kernel-default-4.4.121-92.141.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.141.1.s390x", "product": { "name": "kernel-default-base-4.4.121-92.141.1.s390x", "product_id": "kernel-default-base-4.4.121-92.141.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.141.1.s390x", "product": { "name": "kernel-default-devel-4.4.121-92.141.1.s390x", "product_id": "kernel-default-devel-4.4.121-92.141.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.141.1.s390x", "product": { "name": "kernel-default-extra-4.4.121-92.141.1.s390x", "product_id": "kernel-default-extra-4.4.121-92.141.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.141.1.s390x", "product": { "name": "kernel-default-kgraft-4.4.121-92.141.1.s390x", "product_id": "kernel-default-kgraft-4.4.121-92.141.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.121-92.141.1.s390x", "product": { "name": "kernel-default-man-4.4.121-92.141.1.s390x", "product_id": "kernel-default-man-4.4.121-92.141.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.141.1.s390x", "product": { "name": "kernel-obs-build-4.4.121-92.141.1.s390x", "product_id": "kernel-obs-build-4.4.121-92.141.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.141.1.s390x", "product": { "name": "kernel-obs-qa-4.4.121-92.141.1.s390x", "product_id": "kernel-obs-qa-4.4.121-92.141.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.141.1.s390x", "product": { "name": "kernel-syms-4.4.121-92.141.1.s390x", "product_id": "kernel-syms-4.4.121-92.141.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.141.1.s390x", "product": { "name": "kernel-vanilla-4.4.121-92.141.1.s390x", "product_id": "kernel-vanilla-4.4.121-92.141.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.141.1.s390x", "product": { "name": "kernel-vanilla-base-4.4.121-92.141.1.s390x", "product_id": "kernel-vanilla-base-4.4.121-92.141.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.141.1.s390x", "product": { "name": "kernel-vanilla-devel-4.4.121-92.141.1.s390x", "product_id": "kernel-vanilla-devel-4.4.121-92.141.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.4.121-92.141.1.s390x", "product": { "name": "kernel-zfcpdump-4.4.121-92.141.1.s390x", "product_id": "kernel-zfcpdump-4.4.121-92.141.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.141.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.121-92.141.1.s390x", "product_id": "ocfs2-kmp-default-4.4.121-92.141.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.141.1.s390x", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.141.1.s390x", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.141.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.141.1.x86_64", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.141.1.x86_64", "product_id": "cluster-md-kmp-debug-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.141.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.141.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.141.1.x86_64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.141.1.x86_64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.141.1.x86_64", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.141.1.x86_64", "product_id": "cluster-network-kmp-debug-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.141.1.x86_64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.141.1.x86_64", "product_id": "cluster-network-kmp-default-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.141.1.x86_64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.141.1.x86_64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.141.1.x86_64", "product": { "name": "dlm-kmp-debug-4.4.121-92.141.1.x86_64", "product_id": "dlm-kmp-debug-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.141.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.121-92.141.1.x86_64", "product_id": "dlm-kmp-default-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.141.1.x86_64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.141.1.x86_64", "product_id": "dlm-kmp-vanilla-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.141.1.x86_64", "product": { "name": "gfs2-kmp-debug-4.4.121-92.141.1.x86_64", "product_id": "gfs2-kmp-debug-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.141.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.121-92.141.1.x86_64", "product_id": "gfs2-kmp-default-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.141.1.x86_64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.141.1.x86_64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.141.1.x86_64", "product": { "name": "kernel-debug-4.4.121-92.141.1.x86_64", "product_id": "kernel-debug-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.141.1.x86_64", "product": { "name": "kernel-debug-base-4.4.121-92.141.1.x86_64", "product_id": "kernel-debug-base-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.141.1.x86_64", "product": { "name": "kernel-debug-devel-4.4.121-92.141.1.x86_64", "product_id": "kernel-debug-devel-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.141.1.x86_64", "product": { "name": "kernel-debug-extra-4.4.121-92.141.1.x86_64", "product_id": "kernel-debug-extra-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.141.1.x86_64", "product": { "name": "kernel-debug-kgraft-4.4.121-92.141.1.x86_64", "product_id": "kernel-debug-kgraft-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.141.1.x86_64", "product": { "name": "kernel-default-4.4.121-92.141.1.x86_64", "product_id": "kernel-default-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.141.1.x86_64", "product": { "name": "kernel-default-base-4.4.121-92.141.1.x86_64", "product_id": "kernel-default-base-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.141.1.x86_64", "product": { "name": "kernel-default-devel-4.4.121-92.141.1.x86_64", "product_id": "kernel-default-devel-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.141.1.x86_64", "product": { "name": "kernel-default-extra-4.4.121-92.141.1.x86_64", "product_id": "kernel-default-extra-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.141.1.x86_64", "product": { "name": "kernel-default-kgraft-4.4.121-92.141.1.x86_64", "product_id": "kernel-default-kgraft-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.141.1.x86_64", "product": { "name": "kernel-obs-build-4.4.121-92.141.1.x86_64", "product_id": "kernel-obs-build-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.141.1.x86_64", "product": { "name": "kernel-obs-qa-4.4.121-92.141.1.x86_64", "product_id": "kernel-obs-qa-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.141.1.x86_64", "product": { "name": "kernel-syms-4.4.121-92.141.1.x86_64", "product_id": "kernel-syms-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.141.1.x86_64", "product": { "name": "kernel-vanilla-4.4.121-92.141.1.x86_64", "product_id": "kernel-vanilla-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.141.1.x86_64", "product": { "name": "kernel-vanilla-base-4.4.121-92.141.1.x86_64", "product_id": "kernel-vanilla-base-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.141.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.141.1.x86_64", "product_id": "kernel-vanilla-devel-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.141.1.x86_64", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.141.1.x86_64", "product_id": "ocfs2-kmp-debug-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.141.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.141.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.121-92.141.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.141.1.x86_64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.141.1.x86_64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.141.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.141.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.s390x" }, "product_reference": "kernel-default-4.4.121-92.141.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.141.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.141.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.141.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.141.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.141.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.141.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.141.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.141.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.141.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.141.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.141.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.141.1.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.141.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.141.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.141.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.141.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.141.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.141.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.141.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.141.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.141.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.141.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.141.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.s390x" }, "product_reference": "kernel-syms-4.4.121-92.141.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.141.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.141.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.141.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.141.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.141.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.141.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.141.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.141.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.141.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.ppc64le" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.141.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.141.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.s390x" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.141.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.141.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.x86_64" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.141.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.141.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.4.121-92.141.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.141.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.s390x" }, "product_reference": "dlm-kmp-default-4.4.121-92.141.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.141.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.x86_64" }, "product_reference": "dlm-kmp-default-4.4.121-92.141.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.141.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.4.121-92.141.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.141.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.s390x" }, "product_reference": "gfs2-kmp-default-4.4.121-92.141.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.141.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.4.121-92.141.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.141.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.141.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.141.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.141.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.141.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.141.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.141.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.141.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.141.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.141.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.141.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.141.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.141.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.141.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.141.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.141.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.141.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.141.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.141.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.141.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.141.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.141.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.141.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.141.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.141.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.141.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.141.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.141.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.141.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.141.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.141.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.141.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.141.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.141.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.s390x" }, "product_reference": "kernel-default-4.4.121-92.141.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.141.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.141.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.141.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.141.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.141.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.141.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.141.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.141.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.141.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.141.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.141.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.141.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.141.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.141.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.141.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.141.1.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.141.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.141.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.141.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.141.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.141.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.141.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.141.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.141.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.141.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.141.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.141.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.141.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.141.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.s390x" }, "product_reference": "kernel-syms-4.4.121-92.141.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.141.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.141.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.141.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.141.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.141.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.141.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.141.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.141.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.141.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.141.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.141.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.141.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.141.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.141.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.141.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.141.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.141.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.141.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.141.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.141.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.141.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.141.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.141.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-09T05:17:13Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2020-14314", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14314" } ], "notes": [ { "category": "general", "text": "A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14314", "url": "https://www.suse.com/security/cve/CVE-2020-14314" }, { "category": "external", "summary": "SUSE Bug 1173798 for CVE-2020-14314", "url": "https://bugzilla.suse.com/1173798" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-09T05:17:13Z", "details": "moderate" } ], "title": "CVE-2020-14314" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-09T05:17:13Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14386" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14386", "url": "https://www.suse.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "SUSE Bug 1176069 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176069" }, { "category": "external", "summary": "SUSE Bug 1176072 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-09T05:17:13Z", "details": "important" } ], "title": "CVE-2020-14386" }, { "cve": "CVE-2020-16166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16166" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16166", "url": "https://www.suse.com/security/cve/CVE-2020-16166" }, { "category": "external", "summary": "SUSE Bug 1174757 for CVE-2020-16166", "url": "https://bugzilla.suse.com/1174757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.141.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.141.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.141.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_141-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-09T05:17:13Z", "details": "moderate" } ], "title": "CVE-2020-16166" } ] }
suse-su-2021:14630-1
Vulnerability from csaf_suse
Published
2021-02-16 15:31
Modified
2021-02-16 15:31
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).
- CVE-2020-14353: Fixed an issue where keys - for keyctl prevent creating a different user's keyrings (bsc#1174993).
- CVE-2020-14381: Fixed requeue paths such that filp was valid when dropping the references (bsc#1176011).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-25285: A race condition between hugetlb sysctl handlers in mm/hugetlb.c could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact (bnc#1176485 ).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service (bsc#1179140).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).
- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
The following non-security bugs were fixed:
- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
- cifs: bugfix for unreclaimed writeback pages in cifs_writev_requeue() (bsc#1177906).
- mm, vmstat: reduce zone->lock holding time by /proc/pagetypeinfo (bsc#1175691).
- net/x25: fix a race in x25_bind() (bsc#1178590).
- net/x25: prevent a couple of overflows (bsc#1178590).
- tty: fix memleak in alloc_pid (bsc#1179745).
- xfs: mark all internal workqueues as freezable (bsc#1181166).
Patchnames
slessp4-kernel-source-14630,slexsp3-kernel-source-14630
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n\n- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).\n- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).\n- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).\n- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).\n- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).\n- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).\n- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).\n- CVE-2020-14353: Fixed an issue where keys - for keyctl prevent creating a different user\u0027s keyrings (bsc#1174993).\n- CVE-2020-14381: Fixed requeue paths such that filp was valid when dropping the references (bsc#1176011).\n- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).\n- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).\n- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).\n- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).\n- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).\n- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).\n- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).\n- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).\n- CVE-2020-25285: A race condition between hugetlb sysctl handlers in mm/hugetlb.c could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact (bnc#1176485 ).\n- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service (bsc#1179140).\n- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).\n- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).\n- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).\n- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).\n- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).\n- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).\n- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).\n- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).\n- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).\n- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).\n\nThe following non-security bugs were fixed:\n\n- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).\n- cifs: bugfix for unreclaimed writeback pages in cifs_writev_requeue() (bsc#1177906).\n- mm, vmstat: reduce zone-\u003elock holding time by /proc/pagetypeinfo (bsc#1175691).\n- net/x25: fix a race in x25_bind() (bsc#1178590).\n- net/x25: prevent a couple of overflows (bsc#1178590).\n- tty: fix memleak in alloc_pid (bsc#1179745).\n- xfs: mark all internal workqueues as freezable (bsc#1181166).\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp4-kernel-source-14630,slexsp3-kernel-source-14630", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_14630-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:14630-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:14630-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" }, { "category": "self", "summary": "SUSE Bug 1152107", "url": "https://bugzilla.suse.com/1152107" }, { "category": "self", "summary": "SUSE Bug 1168952", "url": "https://bugzilla.suse.com/1168952" }, { "category": "self", "summary": "SUSE Bug 1173659", "url": "https://bugzilla.suse.com/1173659" }, { "category": "self", "summary": "SUSE Bug 1173942", "url": "https://bugzilla.suse.com/1173942" }, { "category": "self", "summary": "SUSE Bug 1174205", "url": "https://bugzilla.suse.com/1174205" }, { "category": "self", "summary": "SUSE Bug 1174247", "url": "https://bugzilla.suse.com/1174247" }, { "category": "self", "summary": "SUSE Bug 1174993", "url": "https://bugzilla.suse.com/1174993" }, { "category": "self", "summary": "SUSE Bug 1175691", "url": "https://bugzilla.suse.com/1175691" }, { "category": "self", "summary": "SUSE Bug 1176011", "url": "https://bugzilla.suse.com/1176011" }, { "category": "self", "summary": "SUSE Bug 1176012", "url": "https://bugzilla.suse.com/1176012" }, { "category": "self", "summary": "SUSE Bug 1176235", "url": "https://bugzilla.suse.com/1176235" }, { "category": "self", "summary": "SUSE Bug 1176253", "url": "https://bugzilla.suse.com/1176253" }, { "category": "self", "summary": "SUSE Bug 1176278", "url": "https://bugzilla.suse.com/1176278" }, { "category": "self", "summary": "SUSE Bug 1176395", "url": "https://bugzilla.suse.com/1176395" }, { "category": "self", "summary": "SUSE Bug 1176423", "url": "https://bugzilla.suse.com/1176423" }, { "category": "self", "summary": "SUSE Bug 1176482", "url": "https://bugzilla.suse.com/1176482" }, { "category": "self", "summary": "SUSE Bug 1176485", "url": "https://bugzilla.suse.com/1176485" }, { "category": "self", "summary": "SUSE Bug 1176722", "url": "https://bugzilla.suse.com/1176722" }, { "category": "self", "summary": "SUSE Bug 1176896", "url": "https://bugzilla.suse.com/1176896" }, { "category": "self", "summary": "SUSE Bug 1177206", "url": "https://bugzilla.suse.com/1177206" }, { "category": "self", "summary": "SUSE Bug 1177226", "url": "https://bugzilla.suse.com/1177226" }, { "category": "self", "summary": "SUSE Bug 1177666", "url": "https://bugzilla.suse.com/1177666" }, { "category": "self", "summary": "SUSE Bug 1177766", "url": "https://bugzilla.suse.com/1177766" }, { "category": "self", "summary": "SUSE Bug 1177906", "url": "https://bugzilla.suse.com/1177906" }, { "category": "self", "summary": "SUSE Bug 1178123", "url": "https://bugzilla.suse.com/1178123" }, { "category": "self", "summary": "SUSE Bug 1178182", "url": "https://bugzilla.suse.com/1178182" }, { "category": "self", "summary": "SUSE Bug 1178589", "url": "https://bugzilla.suse.com/1178589" }, { "category": "self", "summary": "SUSE Bug 1178590", "url": "https://bugzilla.suse.com/1178590" }, { "category": "self", "summary": "SUSE Bug 1178622", "url": "https://bugzilla.suse.com/1178622" }, { "category": "self", "summary": "SUSE Bug 1178886", "url": "https://bugzilla.suse.com/1178886" }, { "category": "self", "summary": "SUSE Bug 1179107", "url": "https://bugzilla.suse.com/1179107" }, { "category": "self", "summary": "SUSE Bug 1179140", "url": "https://bugzilla.suse.com/1179140" }, { "category": "self", "summary": "SUSE Bug 1179141", "url": "https://bugzilla.suse.com/1179141" }, { "category": "self", "summary": "SUSE Bug 1179419", "url": "https://bugzilla.suse.com/1179419" }, { "category": "self", "summary": "SUSE Bug 1179601", "url": "https://bugzilla.suse.com/1179601" }, { "category": "self", "summary": "SUSE Bug 1179616", "url": "https://bugzilla.suse.com/1179616" }, { "category": "self", "summary": "SUSE Bug 1179745", "url": "https://bugzilla.suse.com/1179745" }, { "category": "self", "summary": "SUSE Bug 1179877", "url": "https://bugzilla.suse.com/1179877" }, { "category": "self", "summary": "SUSE Bug 1180029", "url": "https://bugzilla.suse.com/1180029" }, { "category": "self", "summary": "SUSE Bug 1180030", "url": "https://bugzilla.suse.com/1180030" }, { "category": "self", "summary": "SUSE Bug 1180052", "url": "https://bugzilla.suse.com/1180052" }, { "category": "self", "summary": "SUSE Bug 1180086", "url": "https://bugzilla.suse.com/1180086" }, { "category": "self", "summary": "SUSE Bug 1180559", "url": "https://bugzilla.suse.com/1180559" }, { "category": "self", "summary": "SUSE Bug 1180562", "url": "https://bugzilla.suse.com/1180562" }, { "category": "self", "summary": "SUSE Bug 1181158", "url": "https://bugzilla.suse.com/1181158" }, { "category": "self", "summary": "SUSE Bug 1181166", "url": "https://bugzilla.suse.com/1181166" }, { "category": "self", "summary": "SUSE Bug 1181349", "url": "https://bugzilla.suse.com/1181349" }, { "category": "self", "summary": "SUSE Bug 1181553", "url": "https://bugzilla.suse.com/1181553" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0404 page", "url": "https://www.suse.com/security/cve/CVE-2020-0404/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0431 page", "url": "https://www.suse.com/security/cve/CVE-2020-0431/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0465 page", "url": "https://www.suse.com/security/cve/CVE-2020-0465/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11668 page", "url": "https://www.suse.com/security/cve/CVE-2020-11668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14353 page", "url": "https://www.suse.com/security/cve/CVE-2020-14353/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14381 page", "url": "https://www.suse.com/security/cve/CVE-2020-14381/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14390 page", "url": "https://www.suse.com/security/cve/CVE-2020-14390/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15436 page", "url": "https://www.suse.com/security/cve/CVE-2020-15436/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15437 page", "url": "https://www.suse.com/security/cve/CVE-2020-15437/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25211 page", "url": "https://www.suse.com/security/cve/CVE-2020-25211/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25284 page", "url": "https://www.suse.com/security/cve/CVE-2020-25284/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25285 page", "url": "https://www.suse.com/security/cve/CVE-2020-25285/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25643 page", "url": "https://www.suse.com/security/cve/CVE-2020-25643/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25669 page", "url": "https://www.suse.com/security/cve/CVE-2020-25669/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27068 page", "url": "https://www.suse.com/security/cve/CVE-2020-27068/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27777 page", "url": "https://www.suse.com/security/cve/CVE-2020-27777/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27786 page", "url": "https://www.suse.com/security/cve/CVE-2020-27786/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28915 page", "url": "https://www.suse.com/security/cve/CVE-2020-28915/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28974 page", "url": "https://www.suse.com/security/cve/CVE-2020-28974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29660 page", "url": "https://www.suse.com/security/cve/CVE-2020-29660/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29661 page", "url": "https://www.suse.com/security/cve/CVE-2020-29661/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-36158 page", "url": "https://www.suse.com/security/cve/CVE-2020-36158/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-4788 page", "url": "https://www.suse.com/security/cve/CVE-2020-4788/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3347 page", "url": "https://www.suse.com/security/cve/CVE-2021-3347/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2021-02-16T15:31:37Z", "generator": { "date": "2021-02-16T15:31:37Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:14630-1", "initial_release_date": "2021-02-16T15:31:37Z", "revision_history": [ { "date": "2021-02-16T15:31:37Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.120.1.i586", "product": { "name": "kernel-default-3.0.101-108.120.1.i586", "product_id": "kernel-default-3.0.101-108.120.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.120.1.i586", "product": { "name": "kernel-default-base-3.0.101-108.120.1.i586", "product_id": "kernel-default-base-3.0.101-108.120.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.120.1.i586", "product": { "name": "kernel-default-devel-3.0.101-108.120.1.i586", "product_id": "kernel-default-devel-3.0.101-108.120.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.120.1.i586", "product": { "name": "kernel-ec2-3.0.101-108.120.1.i586", "product_id": "kernel-ec2-3.0.101-108.120.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.120.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-108.120.1.i586", "product_id": "kernel-ec2-base-3.0.101-108.120.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.120.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-108.120.1.i586", "product_id": "kernel-ec2-devel-3.0.101-108.120.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-108.120.1.i586", "product": { "name": "kernel-pae-3.0.101-108.120.1.i586", "product_id": "kernel-pae-3.0.101-108.120.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-108.120.1.i586", "product": { "name": "kernel-pae-base-3.0.101-108.120.1.i586", "product_id": "kernel-pae-base-3.0.101-108.120.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-108.120.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-108.120.1.i586", "product_id": "kernel-pae-devel-3.0.101-108.120.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.120.1.i586", "product": { "name": "kernel-source-3.0.101-108.120.1.i586", "product_id": "kernel-source-3.0.101-108.120.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.120.1.i586", "product": { "name": "kernel-syms-3.0.101-108.120.1.i586", "product_id": "kernel-syms-3.0.101-108.120.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.120.1.i586", "product": { "name": "kernel-trace-3.0.101-108.120.1.i586", "product_id": "kernel-trace-3.0.101-108.120.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.120.1.i586", "product": { "name": "kernel-trace-base-3.0.101-108.120.1.i586", "product_id": "kernel-trace-base-3.0.101-108.120.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.120.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-108.120.1.i586", "product_id": "kernel-trace-devel-3.0.101-108.120.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.120.1.i586", "product": { "name": "kernel-xen-3.0.101-108.120.1.i586", "product_id": "kernel-xen-3.0.101-108.120.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.120.1.i586", "product": { "name": "kernel-xen-base-3.0.101-108.120.1.i586", "product_id": "kernel-xen-base-3.0.101-108.120.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.120.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-108.120.1.i586", "product_id": "kernel-xen-devel-3.0.101-108.120.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-bigmem-3.0.101-108.120.1.ppc64", "product": { "name": "kernel-bigmem-3.0.101-108.120.1.ppc64", "product_id": "kernel-bigmem-3.0.101-108.120.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-base-3.0.101-108.120.1.ppc64", "product": { "name": "kernel-bigmem-base-3.0.101-108.120.1.ppc64", "product_id": "kernel-bigmem-base-3.0.101-108.120.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "product": { "name": "kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "product_id": "kernel-bigmem-devel-3.0.101-108.120.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-108.120.1.ppc64", "product": { "name": "kernel-default-3.0.101-108.120.1.ppc64", "product_id": "kernel-default-3.0.101-108.120.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.120.1.ppc64", "product": { "name": "kernel-default-base-3.0.101-108.120.1.ppc64", "product_id": "kernel-default-base-3.0.101-108.120.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.120.1.ppc64", "product": { "name": "kernel-default-devel-3.0.101-108.120.1.ppc64", "product_id": "kernel-default-devel-3.0.101-108.120.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-3.0.101-108.120.1.ppc64", "product": { "name": "kernel-ppc64-3.0.101-108.120.1.ppc64", "product_id": "kernel-ppc64-3.0.101-108.120.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-base-3.0.101-108.120.1.ppc64", "product": { "name": "kernel-ppc64-base-3.0.101-108.120.1.ppc64", "product_id": "kernel-ppc64-base-3.0.101-108.120.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "product": { "name": "kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "product_id": "kernel-ppc64-devel-3.0.101-108.120.1.ppc64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.120.1.ppc64", "product": { "name": "kernel-source-3.0.101-108.120.1.ppc64", "product_id": "kernel-source-3.0.101-108.120.1.ppc64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.120.1.ppc64", "product": { "name": "kernel-syms-3.0.101-108.120.1.ppc64", "product_id": "kernel-syms-3.0.101-108.120.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.120.1.ppc64", "product": { "name": "kernel-trace-3.0.101-108.120.1.ppc64", "product_id": "kernel-trace-3.0.101-108.120.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.120.1.ppc64", "product": { "name": "kernel-trace-base-3.0.101-108.120.1.ppc64", "product_id": "kernel-trace-base-3.0.101-108.120.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.120.1.ppc64", "product": { "name": "kernel-trace-devel-3.0.101-108.120.1.ppc64", "product_id": "kernel-trace-devel-3.0.101-108.120.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.120.1.s390x", "product": { "name": "kernel-default-3.0.101-108.120.1.s390x", "product_id": "kernel-default-3.0.101-108.120.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.120.1.s390x", "product": { "name": "kernel-default-base-3.0.101-108.120.1.s390x", "product_id": "kernel-default-base-3.0.101-108.120.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.120.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-108.120.1.s390x", "product_id": "kernel-default-devel-3.0.101-108.120.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-108.120.1.s390x", "product": { "name": "kernel-default-man-3.0.101-108.120.1.s390x", "product_id": "kernel-default-man-3.0.101-108.120.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.120.1.s390x", "product": { "name": "kernel-source-3.0.101-108.120.1.s390x", "product_id": "kernel-source-3.0.101-108.120.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.120.1.s390x", "product": { "name": "kernel-syms-3.0.101-108.120.1.s390x", "product_id": "kernel-syms-3.0.101-108.120.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.120.1.s390x", "product": { "name": "kernel-trace-3.0.101-108.120.1.s390x", "product_id": "kernel-trace-3.0.101-108.120.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.120.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-108.120.1.s390x", "product_id": "kernel-trace-base-3.0.101-108.120.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.120.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-108.120.1.s390x", "product_id": "kernel-trace-devel-3.0.101-108.120.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.120.1.x86_64", "product": { "name": "kernel-default-3.0.101-108.120.1.x86_64", "product_id": "kernel-default-3.0.101-108.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.120.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-108.120.1.x86_64", "product_id": "kernel-default-base-3.0.101-108.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.120.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-108.120.1.x86_64", "product_id": "kernel-default-devel-3.0.101-108.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.120.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-108.120.1.x86_64", "product_id": "kernel-ec2-3.0.101-108.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.120.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-108.120.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-108.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.120.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-108.120.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-108.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.120.1.x86_64", "product": { "name": "kernel-source-3.0.101-108.120.1.x86_64", "product_id": "kernel-source-3.0.101-108.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.120.1.x86_64", "product": { "name": "kernel-syms-3.0.101-108.120.1.x86_64", "product_id": "kernel-syms-3.0.101-108.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.120.1.x86_64", "product": { "name": "kernel-trace-3.0.101-108.120.1.x86_64", "product_id": "kernel-trace-3.0.101-108.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.120.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-108.120.1.x86_64", "product_id": "kernel-trace-base-3.0.101-108.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.120.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-108.120.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-108.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.120.1.x86_64", "product": { "name": "kernel-xen-3.0.101-108.120.1.x86_64", "product_id": "kernel-xen-3.0.101-108.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.120.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-108.120.1.x86_64", "product_id": "kernel-xen-base-3.0.101-108.120.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.120.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-108.120.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-108.120.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-108.120.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-108.120.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586" }, "product_reference": "kernel-default-3.0.101-108.120.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64" }, "product_reference": "kernel-default-3.0.101-108.120.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.120.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x" }, "product_reference": "kernel-default-3.0.101-108.120.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64" }, "product_reference": "kernel-default-3.0.101-108.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586" }, "product_reference": "kernel-default-base-3.0.101-108.120.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-108.120.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.120.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-108.120.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-108.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-108.120.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-108.120.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.120.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-108.120.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-108.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-108.120.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-108.120.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586" }, "product_reference": "kernel-ec2-3.0.101-108.120.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-108.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-108.120.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-108.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-108.120.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-108.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586" }, "product_reference": "kernel-pae-3.0.101-108.120.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-108.120.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-108.120.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-108.120.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-108.120.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586" }, "product_reference": "kernel-source-3.0.101-108.120.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64" }, "product_reference": "kernel-source-3.0.101-108.120.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.120.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x" }, "product_reference": "kernel-source-3.0.101-108.120.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64" }, "product_reference": "kernel-source-3.0.101-108.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586" }, "product_reference": "kernel-syms-3.0.101-108.120.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-108.120.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.120.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x" }, "product_reference": "kernel-syms-3.0.101-108.120.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-108.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586" }, "product_reference": "kernel-trace-3.0.101-108.120.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-108.120.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.120.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x" }, "product_reference": "kernel-trace-3.0.101-108.120.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-108.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-108.120.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-108.120.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.120.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-108.120.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-108.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-108.120.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-108.120.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.120.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-108.120.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-108.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586" }, "product_reference": "kernel-xen-3.0.101-108.120.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-108.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-108.120.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-108.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-108.120.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-108.120.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2020-0404", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0404" } ], "notes": [ { "category": "general", "text": "In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0404", "url": "https://www.suse.com/security/cve/CVE-2020-0404" }, { "category": "external", "summary": "SUSE Bug 1176423 for CVE-2020-0404", "url": "https://bugzilla.suse.com/1176423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "moderate" } ], "title": "CVE-2020-0404" }, { "cve": "CVE-2020-0431", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0431" } ], "notes": [ { "category": "general", "text": "In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0431", "url": "https://www.suse.com/security/cve/CVE-2020-0431" }, { "category": "external", "summary": "SUSE Bug 1176722 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176722" }, { "category": "external", "summary": "SUSE Bug 1176896 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "important" } ], "title": "CVE-2020-0431" }, { "cve": "CVE-2020-0465", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0465" } ], "notes": [ { "category": "general", "text": "In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0465", "url": "https://www.suse.com/security/cve/CVE-2020-0465" }, { "category": "external", "summary": "SUSE Bug 1180029 for CVE-2020-0465", "url": "https://bugzilla.suse.com/1180029" }, { "category": "external", "summary": "SUSE Bug 1180030 for CVE-2020-0465", "url": "https://bugzilla.suse.com/1180030" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "important" } ], "title": "CVE-2020-0465" }, { "cve": "CVE-2020-11668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11668" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11668", "url": "https://www.suse.com/security/cve/CVE-2020-11668" }, { "category": "external", "summary": "SUSE Bug 1168952 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1168952" }, { "category": "external", "summary": "SUSE Bug 1173942 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1173942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "important" } ], "title": "CVE-2020-11668" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14353", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14353" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-18270. Reason: This candidate is a duplicate of CVE-2017-18270. Notes: All CVE users should reference CVE-2017-18270 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14353", "url": "https://www.suse.com/security/cve/CVE-2020-14353" }, { "category": "external", "summary": "SUSE Bug 1174993 for CVE-2020-14353", "url": "https://bugzilla.suse.com/1174993" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "moderate" } ], "title": "CVE-2020-14353" }, { "cve": "CVE-2020-14381", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14381" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14381", "url": "https://www.suse.com/security/cve/CVE-2020-14381" }, { "category": "external", "summary": "SUSE Bug 1176011 for CVE-2020-14381", "url": "https://bugzilla.suse.com/1176011" }, { "category": "external", "summary": "SUSE Bug 1176012 for CVE-2020-14381", "url": "https://bugzilla.suse.com/1176012" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "important" } ], "title": "CVE-2020-14381" }, { "cve": "CVE-2020-14390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14390" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14390", "url": "https://www.suse.com/security/cve/CVE-2020-14390" }, { "category": "external", "summary": "SUSE Bug 1176235 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176235" }, { "category": "external", "summary": "SUSE Bug 1176253 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176253" }, { "category": "external", "summary": "SUSE Bug 1176278 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "important" } ], "title": "CVE-2020-14390" }, { "cve": "CVE-2020-15436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15436" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15436", "url": "https://www.suse.com/security/cve/CVE-2020-15436" }, { "category": "external", "summary": "SUSE Bug 1179141 for CVE-2020-15436", "url": "https://bugzilla.suse.com/1179141" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "moderate" } ], "title": "CVE-2020-15436" }, { "cve": "CVE-2020-15437", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15437" } ], "notes": [ { "category": "general", "text": "The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p-\u003eserial_in pointer which uninitialized.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15437", "url": "https://www.suse.com/security/cve/CVE-2020-15437" }, { "category": "external", "summary": "SUSE Bug 1179140 for CVE-2020-15437", "url": "https://bugzilla.suse.com/1179140" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "moderate" } ], "title": "CVE-2020-15437" }, { "cve": "CVE-2020-25211", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25211" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25211", "url": "https://www.suse.com/security/cve/CVE-2020-25211" }, { "category": "external", "summary": "SUSE Bug 1176395 for CVE-2020-25211", "url": "https://bugzilla.suse.com/1176395" }, { "category": "external", "summary": "SUSE Bug 1192356 for CVE-2020-25211", "url": "https://bugzilla.suse.com/1192356" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "moderate" } ], "title": "CVE-2020-25211" }, { "cve": "CVE-2020-25284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25284" } ], "notes": [ { "category": "general", "text": "The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25284", "url": "https://www.suse.com/security/cve/CVE-2020-25284" }, { "category": "external", "summary": "SUSE Bug 1176482 for CVE-2020-25284", "url": "https://bugzilla.suse.com/1176482" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "moderate" } ], "title": "CVE-2020-25284" }, { "cve": "CVE-2020-25285", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25285" } ], "notes": [ { "category": "general", "text": "A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25285", "url": "https://www.suse.com/security/cve/CVE-2020-25285" }, { "category": "external", "summary": "SUSE Bug 1176485 for CVE-2020-25285", "url": "https://bugzilla.suse.com/1176485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "moderate" } ], "title": "CVE-2020-25285" }, { "cve": "CVE-2020-25643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25643" } ], "notes": [ { "category": "general", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25643", "url": "https://www.suse.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "SUSE Bug 1177206 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177206" }, { "category": "external", "summary": "SUSE Bug 1177226 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "important" } ], "title": "CVE-2020-25643" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "important" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-25669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25669" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25669", "url": "https://www.suse.com/security/cve/CVE-2020-25669" }, { "category": "external", "summary": "SUSE Bug 1178182 for CVE-2020-25669", "url": "https://bugzilla.suse.com/1178182" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "moderate" } ], "title": "CVE-2020-25669" }, { "cve": "CVE-2020-27068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27068" } ], "notes": [ { "category": "general", "text": "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27068", "url": "https://www.suse.com/security/cve/CVE-2020-27068" }, { "category": "external", "summary": "SUSE Bug 1180086 for CVE-2020-27068", "url": "https://bugzilla.suse.com/1180086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "moderate" } ], "title": "CVE-2020-27068" }, { "cve": "CVE-2020-27777", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27777" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27777", "url": "https://www.suse.com/security/cve/CVE-2020-27777" }, { "category": "external", "summary": "SUSE Bug 1179107 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1179107" }, { "category": "external", "summary": "SUSE Bug 1179419 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1179419" }, { "category": "external", "summary": "SUSE Bug 1200343 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1200343" }, { "category": "external", "summary": "SUSE Bug 1220060 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1220060" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "moderate" } ], "title": "CVE-2020-27777" }, { "cve": "CVE-2020-27786", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27786" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27786", "url": "https://www.suse.com/security/cve/CVE-2020-27786" }, { "category": "external", "summary": "SUSE Bug 1179601 for CVE-2020-27786", "url": "https://bugzilla.suse.com/1179601" }, { "category": "external", "summary": "SUSE Bug 1179616 for CVE-2020-27786", "url": "https://bugzilla.suse.com/1179616" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "important" } ], "title": "CVE-2020-27786" }, { "cve": "CVE-2020-28915", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28915" } ], "notes": [ { "category": "general", "text": "A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28915", "url": "https://www.suse.com/security/cve/CVE-2020-28915" }, { "category": "external", "summary": "SUSE Bug 1178886 for CVE-2020-28915", "url": "https://bugzilla.suse.com/1178886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "moderate" } ], "title": "CVE-2020-28915" }, { "cve": "CVE-2020-28974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28974" } ], "notes": [ { "category": "general", "text": "A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28974", "url": "https://www.suse.com/security/cve/CVE-2020-28974" }, { "category": "external", "summary": "SUSE Bug 1178589 for CVE-2020-28974", "url": "https://bugzilla.suse.com/1178589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "moderate" } ], "title": "CVE-2020-28974" }, { "cve": "CVE-2020-29660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29660" } ], "notes": [ { "category": "general", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29660", "url": "https://www.suse.com/security/cve/CVE-2020-29660" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "important" } ], "title": "CVE-2020-29660" }, { "cve": "CVE-2020-29661", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29661" } ], "notes": [ { "category": "general", "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29661", "url": "https://www.suse.com/security/cve/CVE-2020-29661" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179877" }, { "category": "external", "summary": "SUSE Bug 1214268 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1214268" }, { "category": "external", "summary": "SUSE Bug 1218966 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1218966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "important" } ], "title": "CVE-2020-29661" }, { "cve": "CVE-2020-36158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-36158" } ], "notes": [ { "category": "general", "text": "mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-36158", "url": "https://www.suse.com/security/cve/CVE-2020-36158" }, { "category": "external", "summary": "SUSE Bug 1180559 for CVE-2020-36158", "url": "https://bugzilla.suse.com/1180559" }, { "category": "external", "summary": "SUSE Bug 1180562 for CVE-2020-36158", "url": "https://bugzilla.suse.com/1180562" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "important" } ], "title": "CVE-2020-36158" }, { "cve": "CVE-2020-4788", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-4788" } ], "notes": [ { "category": "general", "text": "IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-4788", "url": "https://www.suse.com/security/cve/CVE-2020-4788" }, { "category": "external", "summary": "SUSE Bug 1177666 for CVE-2020-4788", "url": "https://bugzilla.suse.com/1177666" }, { "category": "external", "summary": "SUSE Bug 1181158 for CVE-2020-4788", "url": "https://bugzilla.suse.com/1181158" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "moderate" } ], "title": "CVE-2020-4788" }, { "cve": "CVE-2021-3347", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3347" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3347", "url": "https://www.suse.com/security/cve/CVE-2021-3347" }, { "category": "external", "summary": "SUSE Bug 1181349 for CVE-2021-3347", "url": "https://bugzilla.suse.com/1181349" }, { "category": "external", "summary": "SUSE Bug 1181553 for CVE-2021-3347", "url": "https://bugzilla.suse.com/1181553" }, { "category": "external", "summary": "SUSE Bug 1190859 for CVE-2021-3347", "url": "https://bugzilla.suse.com/1190859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-16T15:31:37Z", "details": "important" } ], "title": "CVE-2021-3347" } ] }
suse-su-2020:2497-1
Vulnerability from csaf_suse
Published
2020-09-04 11:29
Modified
2020-09-04 11:29
Summary
Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP3)
Description of the patch
This update for the Linux Kernel 4.4.180-94_107 fixes several issues.
The following security issues were fixed:
- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-0155: Fixed a privilege escalation in the i915 graphics driver (bsc#1173663).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2019-19447: Fixed a use-after-free in ext4_put_super (bsc#1173869).
- CVE-2019-18680: Fixed a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c (bsc#1173867).
- CVE-2019-14901: Fixed a heap overflow in the Marvell WiFi driver (bsc#1173661).
- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173100).
Patchnames
SUSE-2020-2497,SUSE-SLE-SAP-12-SP3-2020-2497,SUSE-SLE-SERVER-12-SP3-2020-2497
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.180-94_107 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).\n- CVE-2019-0155: Fixed a privilege escalation in the i915 graphics driver (bsc#1173663).\n- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).\n- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).\n- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).\n- CVE-2019-19447: Fixed a use-after-free in ext4_put_super (bsc#1173869).\n- CVE-2019-18680: Fixed a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c (bsc#1173867).\n- CVE-2019-14901: Fixed a heap overflow in the Marvell WiFi driver (bsc#1173661).\n- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173100).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2497,SUSE-SLE-SAP-12-SP3-2020-2497,SUSE-SLE-SERVER-12-SP3-2020-2497", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2497-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2497-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202497-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2497-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" }, { "category": "self", "summary": "SUSE Bug 1173100", "url": "https://bugzilla.suse.com/1173100" }, { "category": "self", "summary": "SUSE Bug 1173659", "url": "https://bugzilla.suse.com/1173659" }, { "category": "self", "summary": "SUSE Bug 1173661", "url": "https://bugzilla.suse.com/1173661" }, { "category": "self", "summary": "SUSE Bug 1173663", "url": "https://bugzilla.suse.com/1173663" }, { "category": "self", "summary": "SUSE Bug 1173867", "url": "https://bugzilla.suse.com/1173867" }, { "category": "self", "summary": "SUSE Bug 1173869", "url": "https://bugzilla.suse.com/1173869" }, { "category": "self", "summary": "SUSE Bug 1173942", "url": "https://bugzilla.suse.com/1173942" }, { "category": "self", "summary": "SUSE Bug 1173963", "url": "https://bugzilla.suse.com/1173963" }, { "category": "self", "summary": "SUSE Bug 1174247", "url": "https://bugzilla.suse.com/1174247" }, { "category": "self", "summary": "SUSE CVE CVE-2019-0155 page", "url": "https://www.suse.com/security/cve/CVE-2019-0155/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14895 page", "url": "https://www.suse.com/security/cve/CVE-2019-14895/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14901 page", "url": "https://www.suse.com/security/cve/CVE-2019-14901/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18680 page", "url": "https://www.suse.com/security/cve/CVE-2019-18680/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19447 page", "url": "https://www.suse.com/security/cve/CVE-2019-19447/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9458 page", "url": "https://www.suse.com/security/cve/CVE-2019-9458/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11668 page", "url": "https://www.suse.com/security/cve/CVE-2020-11668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" } ], "title": "Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP3)", "tracking": { "current_release_date": "2020-09-04T11:29:30Z", "generator": { "date": "2020-09-04T11:29:30Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2497-1", "initial_release_date": "2020-09-04T11:29:30Z", "revision_history": [ { "date": "2020-09-04T11:29:30Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "product": { "name": "kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "product_id": "kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "product": { "name": "kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "product_id": "kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0155", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-0155" } ], "notes": [ { "category": "general", "text": "Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-0155", "url": "https://www.suse.com/security/cve/CVE-2019-0155" }, { "category": "external", "summary": "SUSE Bug 1135966 for CVE-2019-0155", "url": "https://bugzilla.suse.com/1135966" }, { "category": "external", "summary": "SUSE Bug 1135967 for CVE-2019-0155", "url": "https://bugzilla.suse.com/1135967" }, { "category": "external", "summary": "SUSE Bug 1173663 for CVE-2019-0155", "url": "https://bugzilla.suse.com/1173663" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:30Z", "details": "important" } ], "title": "CVE-2019-0155" }, { "cve": "CVE-2019-14895", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14895" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14895", "url": "https://www.suse.com/security/cve/CVE-2019-14895" }, { "category": "external", "summary": "SUSE Bug 1157042 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1157042" }, { "category": "external", "summary": "SUSE Bug 1157158 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1157158" }, { "category": "external", "summary": "SUSE Bug 1173100 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1173100" }, { "category": "external", "summary": "SUSE Bug 1173660 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1173660" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:30Z", "details": "important" } ], "title": "CVE-2019-14895" }, { "cve": "CVE-2019-14901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14901" } ], "notes": [ { "category": "general", "text": "A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14901", "url": "https://www.suse.com/security/cve/CVE-2019-14901" }, { "category": "external", "summary": "SUSE Bug 1157042 for CVE-2019-14901", "url": "https://bugzilla.suse.com/1157042" }, { "category": "external", "summary": "SUSE Bug 1173661 for CVE-2019-14901", "url": "https://bugzilla.suse.com/1173661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:30Z", "details": "important" } ], "title": "CVE-2019-14901" }, { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:30Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2019-18680", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18680" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 4.4.x before 4.4.195. There is a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c that will cause denial of service, aka CID-91573ae4aed0.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18680", "url": "https://www.suse.com/security/cve/CVE-2019-18680" }, { "category": "external", "summary": "SUSE Bug 1155898 for CVE-2019-18680", "url": "https://bugzilla.suse.com/1155898" }, { "category": "external", "summary": "SUSE Bug 1173867 for CVE-2019-18680", "url": "https://bugzilla.suse.com/1173867" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:30Z", "details": "important" } ], "title": "CVE-2019-18680" }, { "cve": "CVE-2019-19447", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19447" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19447", "url": "https://www.suse.com/security/cve/CVE-2019-19447" }, { "category": "external", "summary": "SUSE Bug 1158819 for CVE-2019-19447", "url": "https://bugzilla.suse.com/1158819" }, { "category": "external", "summary": "SUSE Bug 1173869 for CVE-2019-19447", "url": "https://bugzilla.suse.com/1173869" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:30Z", "details": "important" } ], "title": "CVE-2019-19447" }, { "cve": "CVE-2019-9458", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9458" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9458", "url": "https://www.suse.com/security/cve/CVE-2019-9458" }, { "category": "external", "summary": "SUSE Bug 1168295 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1168295" }, { "category": "external", "summary": "SUSE Bug 1173963 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1173963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:30Z", "details": "important" } ], "title": "CVE-2019-9458" }, { "cve": "CVE-2020-11668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11668" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11668", "url": "https://www.suse.com/security/cve/CVE-2020-11668" }, { "category": "external", "summary": "SUSE Bug 1168952 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1168952" }, { "category": "external", "summary": "SUSE Bug 1173942 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1173942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:30Z", "details": "important" } ], "title": "CVE-2020-11668" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:30Z", "details": "important" } ], "title": "CVE-2020-14331" } ] }
suse-su-2020:2492-1
Vulnerability from csaf_suse
Published
2020-09-04 11:28
Modified
2020-09-04 11:28
Summary
Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP2)
Description of the patch
This update for the Linux Kernel 4.4.121-92_125 fixes several issues.
The following security issues were fixed:
- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2019-19447: Fixed a use-after-free in ext4_put_super (bsc#1173869).
- CVE-2019-14901: Fixed a heap overflow in the Marvell WiFi driver (bsc#1173661).
- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173100).
Patchnames
SUSE-2020-2492,SUSE-SLE-SAP-12-SP2-2020-2492,SUSE-SLE-SERVER-12-SP2-2020-2492
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.121-92_125 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).\n- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).\n- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).\n- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).\n- CVE-2019-19447: Fixed a use-after-free in ext4_put_super (bsc#1173869).\n- CVE-2019-14901: Fixed a heap overflow in the Marvell WiFi driver (bsc#1173661).\n- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173100).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2492,SUSE-SLE-SAP-12-SP2-2020-2492,SUSE-SLE-SERVER-12-SP2-2020-2492", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2492-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2492-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202492-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2492-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" }, { "category": "self", "summary": "SUSE Bug 1173100", "url": "https://bugzilla.suse.com/1173100" }, { "category": "self", "summary": "SUSE Bug 1173659", "url": "https://bugzilla.suse.com/1173659" }, { "category": "self", "summary": "SUSE Bug 1173661", "url": "https://bugzilla.suse.com/1173661" }, { "category": "self", "summary": "SUSE Bug 1173869", "url": "https://bugzilla.suse.com/1173869" }, { "category": "self", "summary": "SUSE Bug 1173942", "url": "https://bugzilla.suse.com/1173942" }, { "category": "self", "summary": "SUSE Bug 1173963", "url": "https://bugzilla.suse.com/1173963" }, { "category": "self", "summary": "SUSE Bug 1174247", "url": "https://bugzilla.suse.com/1174247" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14895 page", "url": "https://www.suse.com/security/cve/CVE-2019-14895/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14901 page", "url": "https://www.suse.com/security/cve/CVE-2019-14901/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19447 page", "url": "https://www.suse.com/security/cve/CVE-2019-19447/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9458 page", "url": "https://www.suse.com/security/cve/CVE-2019-9458/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11668 page", "url": "https://www.suse.com/security/cve/CVE-2020-11668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" } ], "title": "Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP2)", "tracking": { "current_release_date": "2020-09-04T11:28:32Z", "generator": { "date": "2020-09-04T11:28:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2492-1", "initial_release_date": "2020-09-04T11:28:32Z", "revision_history": [ { "date": "2020-09-04T11:28:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "product": { "name": "kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "product_id": "kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64", "product_id": "kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-14895", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14895" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14895", "url": "https://www.suse.com/security/cve/CVE-2019-14895" }, { "category": "external", "summary": "SUSE Bug 1157042 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1157042" }, { "category": "external", "summary": "SUSE Bug 1157158 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1157158" }, { "category": "external", "summary": "SUSE Bug 1173100 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1173100" }, { "category": "external", "summary": "SUSE Bug 1173660 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1173660" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:28:32Z", "details": "important" } ], "title": "CVE-2019-14895" }, { "cve": "CVE-2019-14901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14901" } ], "notes": [ { "category": "general", "text": "A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14901", "url": "https://www.suse.com/security/cve/CVE-2019-14901" }, { "category": "external", "summary": "SUSE Bug 1157042 for CVE-2019-14901", "url": "https://bugzilla.suse.com/1157042" }, { "category": "external", "summary": "SUSE Bug 1173661 for CVE-2019-14901", "url": "https://bugzilla.suse.com/1173661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:28:32Z", "details": "important" } ], "title": "CVE-2019-14901" }, { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:28:32Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2019-19447", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19447" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19447", "url": "https://www.suse.com/security/cve/CVE-2019-19447" }, { "category": "external", "summary": "SUSE Bug 1158819 for CVE-2019-19447", "url": "https://bugzilla.suse.com/1158819" }, { "category": "external", "summary": "SUSE Bug 1173869 for CVE-2019-19447", "url": "https://bugzilla.suse.com/1173869" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:28:32Z", "details": "important" } ], "title": "CVE-2019-19447" }, { "cve": "CVE-2019-9458", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9458" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9458", "url": "https://www.suse.com/security/cve/CVE-2019-9458" }, { "category": "external", "summary": "SUSE Bug 1168295 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1168295" }, { "category": "external", "summary": "SUSE Bug 1173963 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1173963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:28:32Z", "details": "important" } ], "title": "CVE-2019-9458" }, { "cve": "CVE-2020-11668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11668" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11668", "url": "https://www.suse.com/security/cve/CVE-2020-11668" }, { "category": "external", "summary": "SUSE Bug 1168952 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1168952" }, { "category": "external", "summary": "SUSE Bug 1173942 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1173942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:28:32Z", "details": "important" } ], "title": "CVE-2020-11668" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:28:32Z", "details": "important" } ], "title": "CVE-2020-14331" } ] }
suse-su-2020:2540-1
Vulnerability from csaf_suse
Published
2020-09-04 15:36
Modified
2020-09-04 15:36
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup (bsc#1165629).
- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).
- CVE-2020-14356: Fixed a null pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213).
- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).
- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).
- CVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).
The following non-security bugs were fixed:
- ACPI: kABI fixes for subsys exports (bsc#1174968).
- ACPI / LPSS: Resume BYT/CHT I2C controllers from resume_noirq (bsc#1174968).
- ACPI / LPSS: Use acpi_lpss_* instead of acpi_subsys_* functions for hibernate (bsc#1174968).
- ACPI: PM: Introduce 'poweroff' callbacks for ACPI PM domain and LPSS (bsc#1174968).
- ACPI: PM: Simplify and fix PM domain hibernation callbacks (bsc#1174968).
- af_key: pfkey_dump needs parameter validation (git-fixes).
- agp/intel: Fix a memory leak on module initialisation failure (git-fixes).
- ALSA: core: pcm_iec958: fix kernel-doc (bsc#1111666).
- ALSA: echoaduio: Drop superfluous volatile modifier (bsc#1111666).
- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (bsc#1111666).
- ALSA: hda: Add support for Loongson 7A1000 controller (bsc#1111666).
- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (bsc#1111666).
- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (bsc#1111666).
- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (bsc#1111666).
- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).
- ALSA: hda: fix snd_hda_codec_cleanup() documentation (bsc#1111666).
- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (bsc#1111666).
- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (bsc#1111666).
- ALSA: hda/realtek: Add model alc298-samsung-headphone (git-fixes).
- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (bsc#1111666).
- ALSA: hda/realtek - Add quirk for Lenovo Carbon X1 8th gen (bsc#1111666).
- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (bsc#1111666).
- ALSA: hda/realtek - Add quirk for MSI GL63 (bsc#1111666).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex Book (git-fixes).
- ALSA: hda/realtek - change to suitable link model for ASUS platform (bsc#1111666).
- ALSA: hda/realtek - Check headset type by unplug and resume (bsc#1111666).
- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (bsc#1111666).
- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (bsc#1111666).
- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (bsc#1111666).
- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (bsc#1111666).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (bsc#1111666).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (bsc#1111666).
- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (bsc#1111666).
- ALSA: hda/realtek: Fix add a 'ultra_low_power' function for intel reference board (alc256) (bsc#1111666).
- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (bsc#1111666).
- ALSA: hda/realtek - Fixed HP right speaker no sound (bsc#1111666).
- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (bsc#1111666).
- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (bsc#1111666).
- ALSA: hda/realtek - Fix unused variable warning (bsc#1111666).
- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (bsc#1111666).
- ALSA: hda - reverse the setting value in the micmute_led_set (bsc#1111666).
- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).
- ALSA: pci: delete repeated words in comments (bsc#1111666).
- ALSA: seq: oss: Serialize ioctls (bsc#1111666).
- ALSA: usb-audio: Add capture support for Saffire 6 (USB 1.1) (git-fixes).
- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (bsc#1111666).
- ALSA: usb-audio: add startech usb audio dock name (bsc#1111666).
- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (bsc#1111666).
- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (bsc#1111666).
- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (bsc#1111666).
- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (bsc#1111666).
- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).
- ALSA: usb-audio: fix spelling mistake 'buss' -> 'bus' (bsc#1111666).
- ALSA: usb-audio: ignore broken processing/extension unit (git-fixes).
- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (bsc#1111666).
- ALSA: usb/line6: remove 'defined but not used' warning (bsc#1111666).
- arm64: Add MIDR encoding for HiSilicon Taishan CPUs (bsc#1174547).
- arm64: Add MIDR encoding for NVIDIA CPUs (bsc#1174547).
- arm64: add sysfs vulnerability show for meltdown (bsc#1174547).
- arm64: Add sysfs vulnerability show for spectre-v1 (bsc#1174547).
- arm64: add sysfs vulnerability show for spectre-v2 (bsc#1174547).
- arm64: add sysfs vulnerability show for speculative store bypass (bsc#1174547).
- arm64: Advertise mitigation of Spectre-v2, or lack thereof (bsc#1174547).
- arm64: Always enable spectre-v2 vulnerability detection (bsc#1174547).
- arm64: Always enable ssb vulnerability detection (bsc#1174547).
- arm64: backtrace: Do not bother trying to unwind the userspace stack (bsc#1175397).
- arm64: capabilities: Add NVIDIA Denver CPU to bp_harden list (bsc#1174547).
- arm64: capabilities: Merge duplicate Cavium erratum entries (bsc#1174547).
- arm64: capabilities: Merge entries for ARM64_WORKAROUND_CLEAN_CACHE (bsc#1174547). Update config/arm64/default
- arm64: cpufeature: Enable Qualcomm Falkor/Kryo errata 1003 (bsc#1175398).
- arm64: Do not mask out PTE_RDONLY in pte_same() (bsc#1175393).
- arm64: enable generic CPU vulnerabilites support (bsc#1174547). Update config/arm64/default
- arm64: Ensure VM_WRITE|VM_SHARED ptes are clean by default (bsc#1175394).
- arm64: errata: Do not define type field twice for arm64_errata entries (bsc#1174547).
- arm64: errata: Update stale comment (bsc#1174547).
- arm64: Get rid of __smccc_workaround_1_hvc_* (bsc#1174547).
- arm64: kpti: Avoid rewriting early page tables when KASLR is enabled (bsc#1174547).
- arm64: kpti: Update arm64_kernel_use_ng_mappings() when forced on (bsc#1174547).
- arm64: kpti: Whitelist Cortex-A CPUs that do not implement the CSV3 field (bsc#1174547).
- arm64: kpti: Whitelist HiSilicon Taishan v110 CPUs (bsc#1174547).
- arm64: KVM: Avoid setting the upper 32 bits of VTCR_EL2 to 1 (bsc#1133021).
- arm64: KVM: Guests can skip __install_bp_hardening_cb()s HYP work (bsc#1174547).
- arm64: KVM: Use SMCCC_ARCH_WORKAROUND_1 for Falkor BP hardening (bsc#1174547).
- arm64: mm: Fix pte_mkclean, pte_mkdirty semantics (bsc#1175526).
- arm64: Provide a command line to disable spectre_v2 mitigation (bsc#1174547).
- arm64: Silence clang warning on mismatched value/register sizes (bsc#1175396).
- arm64/speculation: Support 'mitigations=' cmdline option (bsc#1174547).
- arm64: ssbd: explicitly depend on <linux/prctl.h> (bsc#1175399).
- arm64: ssbs: Do not treat CPUs with SSBS as unaffected by SSB (bsc#1174547).
- arm64: ssbs: Fix context-switch when SSBS is present on all CPUs (bsc#1175669).
- arm64/sve: Fix wrong free for task->thread.sve_state (bsc#1175400).
- arm64/sve: <uapi/asm/ptrace.h> should not depend on <uapi/linux/prctl.h> (bsc#1175401).
- arm64: tlbflush: avoid writing RES0 bits (bsc#1175402).
- arm64: Use firmware to detect CPUs that are not affected by Spectre-v2 (bsc#1174547).
- ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17 (bsc#1133021).
- ARM: KVM: invalidate icache on guest exit for Cortex-A15 (bsc#1133021).
- ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15 (bsc#1133021).
- ASoC: hda/tegra: Set buffer alignment to 128 bytes (bsc#1111666).
- ASoC: intel: Fix memleak in sst_media_open (git-fixes).
- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).
- AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).
- AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).
- AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).
- ax88172a: fix ax88172a_unbind() failures (git-fixes).
- b43: Remove uninitialized_var() usage (git-fixes).
- bcache: allocate meta data pages as compound pages (bsc#1172873).
- bcache: allocate meta data pages as compound pages (bsc#1172873).
- block: check queue's limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).
- block: check queue's limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).
- block: Fix use-after-free in blkdev_get() (bsc#1174843).
- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).
- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).
- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (bsc#1111666).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (bsc#1111666).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (bsc#1111666).
- bonding: fix active-backup failover for current ARP slave (bsc#1174771).
- bonding: fix a potential double-unregister (git-fixes).
- bonding: show saner speed for broadcast mode (git-fixes).
- bpf: Fix map leak in HASH_OF_MAPS map (git-fixes).
- brcmfmac: keep SDIO watchdog running when console_interval is non-zero (bsc#1111666).
- brcmfmac: set state of hanger slot to FREE when flushing PSQ (bsc#1111666).
- brcmfmac: To fix Bss Info flag definition Bug (bsc#1111666).
- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).
- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).
- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).
- btrfs: fix block group leak when removing fails (bsc#1175149).
- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).
- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).
- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).
- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).
- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).
- btrfs: fix memory leaks after failure to lookup checksums during inode logging (bsc#1175550).
- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).
- btrfs: fix race between block group removal and block group creation (bsc#1175149).
- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).
- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).
- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).
- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).
- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).
- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).
- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).
- btrfs: Open code btrfs_write_and_wait_marked_extents (bsc#1175149).
- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).
- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).
- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).
- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).
- btrfs: Rename and export clear_btree_io_tree (bsc#1175149).
- btrfs: treat RWF_{,D}SYNC writes as sync for CRCs (bsc#1175493).
- bus: hisi_lpc: Add .remove method to avoid driver unbind crash (bsc#1174658).
- bus: hisi_lpc: Do not fail probe for unrecognised child devices (bsc#1174658).
- bus: hisi_lpc: Unregister logical PIO range to avoid potential use-after-free (bsc#1174658).
- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).
- cfg80211: check vendor command doit pointer before use (git-fixes).
- char: virtio: Select VIRTIO from VIRTIO_CONSOLE (bsc#1175667).
- cifs: document and cleanup dfs mount (bsc#1144333 bsc#1172428).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1144333 bsc#1172428).
- cifs: fix double free error on share and prefix (bsc#1144333 bsc#1172428).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1144333 bsc#1172428).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1144333 bsc#1172428).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1144333 bsc#1172428).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1144333 bsc#1172428).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1144333 bsc#1172428).
- cifs: rename reconn_inval_dfs_target() (bsc#1144333 bsc#1172428).
- clk: at91: clk-generated: check best_rate against ranges (bsc#1111666).
- clk: clk-atlas6: fix return value check in atlas6_clk_init() (bsc#1111666).
- clk: iproc: round clock rate to the closest (bsc#1111666).
- clk: spear: Remove uninitialized_var() usage (git-fixes).
- clk: st: Remove uninitialized_var() usage (git-fixes).
- console: newport_con: fix an issue about leak related system resources (git-fixes).
- constrants: fix malformed XML Closing tag of an element is '</foo>', not '<foo/>'. Fixes: 8b37de2eb835 ('rpm/constraints.in: Increase memory for kernel-docs')
- Created new preempt kernel flavor (jsc#SLE-11309) Configs are cloned from the respective $arch/default configs. All changed configs appart from CONFIG_PREEMPT->y are a result of dependencies, namely many lock/unlock primitives are no longer inlined in the preempt kernel. TREE_RCU has been also changed to PREEMPT_RCU which is the default implementation for PREEMPT kernel.
- crypto: ccp - Fix use of merged scatterlists (git-fixes).
- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).
- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).
- crypto: rockchip - fix scatterlist nents error (git-fixes).
- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).
- crypto: talitos - check AES key size (git-fixes).
- crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK (git-fixes).
- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- dev: Defer free of skbs in flush_backlog (git-fixes).
- device property: Fix the secondary firmware node handling in set_primary_fwnode() (git-fixes).
- devres: keep both device name and resource name in pretty name (git-fixes).
- dlm: Fix kobject memleak (bsc#1175768).
- dlm: remove BUG() before panic() (bsc#1174844).
- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).
- Documentation/networking: Add net DIM documentation (bsc#1174852).
- dpaa2-eth: Fix passing zero to 'PTR_ERR' warning (bsc#1175403).
- dpaa2-eth: free already allocated channels on probe defer (bsc#1175404).
- dpaa2-eth: prevent array underflow in update_cls_rule() (bsc#1175405).
- dpaa_eth: add dropped frames to percpu ethtool stats (bsc#1174550).
- dpaa_eth: add newline in dev_err() msg (bsc#1174550).
- dpaa_eth: avoid timestamp read on error paths (bsc#1175406).
- dpaa_eth: change DMA device (bsc#1174550).
- dpaa_eth: cleanup skb_to_contig_fd() (bsc#1174550).
- dpaa_eth: defer probing after qbman (bsc#1174550).
- dpaa_eth: extend delays in ndo_stop (bsc#1174550).
- dpaa_eth: fix DMA mapping leak (bsc#1174550).
- dpaa_eth: Fix one possible memleak in dpaa_eth_probe (bsc#1174550).
- dpaa_eth: FMan erratum A050385 workaround (bsc#1174550).
- dpaa_eth: perform DMA unmapping before read (bsc#1175407).
- dpaa_eth: register a device link for the qman portal used (bsc#1174550).
- dpaa_eth: remove netdev_err() for user errors (bsc#1174550).
- dpaa_eth: remove redundant code (bsc#1174550).
- dpaa_eth: simplify variables used in dpaa_cleanup_tx_fd() (bsc#1174550).
- dpaa_eth: use a page to store the SGT (bsc#1174550).
- dpaa_eth: use fd information in dpaa_cleanup_tx_fd() (bsc#1174550).
- dpaa_eth: use only one buffer pool per interface (bsc#1174550).
- dpaa_eth: use page backed rx buffers (bsc#1174550).
- driver core: Avoid binding drivers to dead devices (git-fixes).
- Drivers: hv: balloon: Remove dependencies on guest page size (git-fixes).
- Drivers: hv: vmbus: Fix virt_to_hvpfn() for X86_PAE (git-fixes).
- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127, bsc#1175128).
- Drivers: hv: vmbus: Remove the undesired put_cpu_ptr() in hv_synic_cleanup() (git-fixes).
- drivers/perf: hisi: Fix typo in events attribute array (bsc#1175408).
- drivers/perf: hisi: Fixup one DDRC PMU register offset (bsc#1175410).
- drivers/perf: hisi: Fix wrong value for all counters enable (bsc#1175409).
- drm: Added orientation quirk for ASUS tablet model T103HAF (bsc#1111666).
- drm/amd/display: fix pow() crashing when given base 0 (git-fixes).
- drm/amdgpu: avoid dereferencing a NULL pointer (bsc#1111666).
- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (bsc#1111666).
- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (bsc#1113956) * refresh for context changes
- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).
- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1113956)
- drm/arm: fix unintentional integer overflow on left shift (git-fixes).
- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1113956) * refreshed for context changes
- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).
- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1113956) * move drm_mipi_dbi.c -> tinydrm/mipi-drm.c * refresh for context changes
- drm/debugfs: fix plain echo to connector 'force' attribute (bsc#1111666).
- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).
- drm/etnaviv: fix ref count leak via pm_runtime_get_sync (bsc#1111666).
- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (bsc#1112178) * updated names of get/put functions
- drm: hold gem reference until object is no longer accessed (bsc#1113956)
- drm/imx: fix use after free (git-fixes).
- drm/imx: imx-ldb: Disable both channels for split mode in enc->disable() (git-fixes).
- drm/imx: tve: fix regulator_disable error path (git-fixes).
- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).
- drm/msm/adreno: fix updating ring fence (git-fixes).
- drm/msm: ratelimit crtc event overflow error (bsc#1111666).
- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).
- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).
- drm/nouveau: fix multiple instances of reference count leaks (bsc#1111666).
- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).
- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).
- drm/radeon: disable AGP by default (bsc#1111666).
- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).
- drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync (bsc#1111666).
- drm/rockchip: fix VOP_WIN_GET macro (bsc#1175411).
- drm/tilcdc: fix leak & null ref in panel_connector_get_modes (bsc#1111666).
- drm/ttm/nouveau: do not call tt destroy callback on alloc failure (bsc#1175232).
- drm/vmwgfx: Fix two list_for_each loop exit tests (bsc#1111666).
- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (bsc#1111666).
- drm/xen-front: Fix misused IS_ERR_OR_NULL checks (bsc#1065600).
- efi/memreserve: deal with memreserve entries in unmapped memory (bsc#1174685).
- ext4: check journal inode extents more carefully (bsc#1173485).
- ext4: do not allow overlapping system zones (bsc#1173485).
- ext4: fix checking of directory entry validity for inline directories (bsc#1175771).
- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1174840).
- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).
- fat: do not allow to mount if the FAT length == 0 (bsc#1174845).
- fbdev: Detect integer underflow at 'struct fbcon_ops'->clear_margins. (bsc#1112178) * move files drivers/video/fbdev/core -> drivers/video/console * refresh for context changes
- firmware: google: check if size is valid when decoding VPD data (git-fixes).
- firmware: google: increment VPD key_len properly (git-fixes).
- fpga: dfl: fix bug in port reset handshake (git-fixes).
- fsl/fman: add API to get the device behind a fman port (bsc#1174550).
- fsl/fman: check dereferencing null pointer (git-fixes).
- fsl/fman: detect FMan erratum A050385 (bsc#1174550).
- fsl/fman: do not touch liodn base regs reserved on non-PAMU SoCs (bsc#1174550).
- fsl/fman: fix dereference null return value (git-fixes).
- fsl/fman: fix eth hash table allocation (git-fixes).
- fsl/fman: fix unreachable code (git-fixes).
- fsl/fman: remove unused struct member (bsc#1174550).
- fsl/fman: use 32-bit unsigned integer (git-fixes).
- fuse: fix memleak in cuse_channel_open (bsc#1174926).
- fuse: fix missing unlock_page in fuse_writepage() (bsc#1174904).
- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175062).
- fuse: fix weird page warning (bsc#1175063).
- fuse: flush dirty data/metadata before non-truncate setattr (bsc#1175064).
- fuse: truncate pending writes on O_TRUNC (bsc#1175065).
- fuse: verify attributes (bsc#1175066).
- fuse: verify nlink (bsc#1175067).
- genetlink: remove genl_bind (networking-stable-20_07_17).
- go7007: add sanity checking for endpoints (git-fixes).
- gpu: host1x: debug: Fix multiple channels emitting messages simultaneously (bsc#1111666).
- HID: hiddev: fix mess in hiddev_open() (git-fixes).
- HISI LPC: Re-Add ACPI child enumeration support (bsc#1174658).
- HISI LPC: Stop using MFD APIs (bsc#1174658).
- hv_balloon: Balloon up according to request page number (git-fixes).
- hv_balloon: Use a static page for the balloon_up send buffer (git-fixes).
- hv_netvsc: Allow scatter-gather feature to be tunable (git-fixes).
- hv_netvsc: do not use VF device if link is down (git-fixes).
- hv_netvsc: Fix a warning of suspicious RCU usage (git-fixes).
- hv_netvsc: Fix error handling in netvsc_attach() (git-fixes).
- hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (git-fixes).
- hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (git-fixes).
- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (git-fixes).
- hv_netvsc: flag software created hash value (git-fixes).
- hv_netvsc: Remove 'unlikely' from netvsc_select_queue (git-fixes).
- i2c: rcar: in slave mode, clear NACK earlier (git-fixes).
- i2c: rcar: slave: only send STOP event when we have been addressed (bsc#1111666).
- i40e: Fix crash during removing i40e driver (git-fixes).
- i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (git-fixes).
- ibmveth: Fix use of ibmveth in a bridge (bsc#1174387 ltc#187506).
- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).
- ibmvnic fix NULL tx_pools and rx_tools issue at do_reset (bsc#1175873 ltc#187922).
- include/linux/poison.h: remove obsolete comment (git fixes (poison)).
- Input: psmouse - add a newline when printing 'proto' by sysfs (git-fixes).
- Input: sentelic - fix error return when fsp_reg_write fails (bsc#1111666).
- integrity: remove redundant initialization of variable ret (git-fixes).
- io-mapping: indicate mapping failure (git-fixes).
- ip6_gre: fix null-ptr-deref in ip6gre_init_net() (git-fixes).
- ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() (networking-stable-20_06_28).
- ip6_tunnel: allow not to count pkts on tstats by passing dev as NULL (bsc#1175515).
- ip_tunnel: allow not to count pkts on tstats by setting skb's dev to NULL (bsc#1175515).
- ip_tunnel: Emit events for post-register MTU changes (git-fixes).
- ip_tunnel: fix use-after-free in ip_tunnel_lookup() (networking-stable-20_06_28).
- ip_tunnel: restore binding to ifaces with a large mtu (git-fixes).
- ipv4: fill fl4_icmp_{type,code} in ping_v4_sendmsg (networking-stable-20_07_17).
- ipv4: Silence suspicious RCU usage warning (git-fixes).
- ipv6: fix memory leaks on IPV6_ADDRFORM path (git-fixes).
- ipvlan: fix device features (git-fixes).
- ipvs: allow connection reuse for unconfirmed conntrack (git-fixes).
- ipvs: fix refcount usage for conns in ops mode (git-fixes).
- ipvs: fix the connection sync failed in some cases (bsc#1174699).
- irqchip/gic: Atomically update affinity (bsc#1111666).
- iwlegacy: Check the return value of pcie_capability_read_*() (bsc#1111666).
- jbd2: add the missing unlock_buffer() in the error path of jbd2_write_superblock() (bsc#1175772).
- kabi: genetlink: remove genl_bind (kabi).
- kabi: hide new parameter of ip6_dst_lookup_flow() (bsc#1165629).
- kabi: mask changes to struct ipv6_stub (bsc#1165629).
- kernel/cpu_pm: Fix uninitted local in cpu_pm (git fixes (kernel/pm)).
- kernel-docs: Change Requires on python-Sphinx to earlier than version 3 References: bsc#1166965 From 3 on the internal API that the build system uses was rewritten in an incompatible way. See https://github.com/sphinx-doc/sphinx/issues/7421 and https://bugzilla.suse.com/show_bug.cgi?id=1166965#c16 for some details.
- kernel/relay.c: fix memleak on destroy relay channel (git-fixes).
- kernfs: do not call fsnotify() with name without a parent (bsc#1175770).
- KVM: arm64: Ensure 'params' is initialised when looking up sys register (bsc#1133021).
- KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART (bsc#1133021).
- KVM: arm/arm64: Fix young bit from mmu notifier (bsc#1133021).
- KVM: arm/arm64: vgic: Do not rely on the wrong pending table (bsc#1133021).
- KVM: arm/arm64: vgic-its: Fix restoration of unmapped collections (bsc#1133021).
- KVM: arm: Fix DFSR setting for non-LPAE aarch32 guests (bsc#1133021).
- KVM: arm: Make inject_abt32() inject an external abort instead (bsc#1133021).
- kvm: Change offset in kvm_write_guest_offset_cached to unsigned (bsc#1133021).
- KVM: Check for a bad hva before dropping into the ghc slow path (bsc#1133021).
- KVM: PPC: Book3S PR: Remove uninitialized_var() usage (bsc#1065729).
- l2tp: remove skb_dst_set() from l2tp_xmit_skb() (networking-stable-20_07_17).
- leds: 88pm860x: fix use-after-free on unbind (git-fixes).
- leds: core: Flush scheduled work for system suspend (git-fixes).
- leds: da903x: fix use-after-free on unbind (git-fixes).
- leds: lm3533: fix use-after-free on unbind (git-fixes).
- leds: lm355x: avoid enum conversion warning (git-fixes).
- leds: wm831x-status: fix use-after-free on unbind (git-fixes).
- lib/dim: Fix -Wunused-const-variable warnings (bsc#1174852).
- lib: dimlib: fix help text typos (bsc#1174852).
- lib: logic_pio: Add logic_pio_unregister_range() (bsc#1174658).
- lib: logic_pio: Avoid possible overlap for unregistering regions (bsc#1174658).
- lib: logic_pio: Fix RCU usage (bsc#1174658).
- linux/dim: Add completions count to dim_sample (bsc#1174852).
- linux/dim: Fix overflow in dim calculation (bsc#1174852).
- linux/dim: Move implementation to .c files (bsc#1174852).
- linux/dim: Move logic to dim.h (bsc#1174852).
- linux/dim: Remove 'net' prefix from internal DIM members (bsc#1174852).
- linux/dim: Rename externally exposed macros (bsc#1174852).
- linux/dim: Rename externally used net_dim members (bsc#1174852).
- linux/dim: Rename net_dim_sample() to net_dim_update_sample() (bsc#1174852).
- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).
- llc: make sure applications use ARPHRD_ETHER (networking-stable-20_07_17).
- mac80211: mesh: Free ie data when leaving mesh (git-fixes).
- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).
- MAINTAINERS: add entry for Dynamic Interrupt Moderation (bsc#1174852).
- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (git-fixes).
- md/raid5: Fix Force reconstruct-write io stuck in degraded raid5 (git-fixes).
- media: budget-core: Improve exception handling in budget_register() (git-fixes).
- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).
- media: firewire: Using uninitialized values in node_probe() (git-fixes).
- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).
- media: vpss: clean up resources in init (git-fixes).
- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).
- mfd: dln2: Run event handler loop under spinlock (git-fixes).
- mfd: rk808: Fix RK818 ID template (bsc#1175412).
- mld: fix memory leak in ipv6_mc_destroy_dev() (networking-stable-20_06_28).
- mm: filemap: clear idle flag for writes (bsc#1175769).
- mm/migrate.c: add missing flush_dcache_page for non-mapped page migrate (git fixes (mm/migrate)).
- mm/mmu_notifier: use hlist_add_head_rcu() (git fixes (mm/mmu_notifiers)).
- mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() (git fixes (mm/compaction)).
- mm/rmap.c: do not reuse anon_vma if we just want a copy (git fixes (mm/rmap)).
- mm/shmem.c: cast the type of unmap_start to u64 (git fixes (mm/shmem)).
- mm, thp: fix defrag setting if newline is not used (git fixes (mm/thp)).
- mm/vunmap: add cond_resched() in vunmap_pmd_range (bsc#1175654 ltc#184617).
- mtd: spi-nor: Fix an error code in spi_nor_read_raw() (bsc#1175413).
- mtd: spi-nor: fix kernel-doc for spi_nor::info (bsc#1175414).
- mtd: spi-nor: fix kernel-doc for spi_nor::reg_proto (bsc#1175415).
- mtd: spi-nor: fix silent truncation in spi_nor_read_raw() (bsc#1175416).
- mwifiex: Prevent memory corruption handling keys (git-fixes).
- net: Added pointer check for dst->ops->neigh_lookup in dst_neigh_lookup_skb (git-fixes).
- net: bridge: enfore alignment for ethernet address (networking-stable-20_06_28).
- net: core: reduce recursion limit value (networking-stable-20_06_28).
- net: Do not clear the sock TX queue in sk_set_socket() (networking-stable-20_06_28).
- net: dsa: b53: check for timeout (git-fixes).
- net: ena: Add first_interrupt field to napi struct (bsc#1174852).
- net: ena: add reserved PCI device ID (bsc#1174852).
- net: ena: add support for reporting of packet drops (bsc#1174852).
- net: ena: add support for the rx offset feature (bsc#1174852).
- net: ena: add support for traffic mirroring (bsc#1174852).
- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).
- net: ena: allow setting the hash function without changing the key (bsc#1174852).
- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).
- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).
- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).
- net: ena: change num_queues to num_io_queues for clarity and consistency (bsc#1174852).
- net: ena: changes to RSS hash key allocation (bsc#1174852).
- net: ena: Change WARN_ON expression in ena_del_napi_in_range() (bsc#1174852).
- net: ena: clean up indentation issue (bsc#1174852).
- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).
- net: ena: cosmetic: code reorderings (bsc#1174852).
- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).
- net: ena: cosmetic: fix line break issues (bsc#1174852).
- net: ena: cosmetic: fix spacing issues (bsc#1174852).
- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).
- net: ena: cosmetic: minor code changes (bsc#1174852).
- net: ena: cosmetic: remove unnecessary code (bsc#1174852).
- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).
- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).
- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).
- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).
- net: ena: drop superfluous prototype (bsc#1174852).
- net: ena: enable support of rss hash key and function changes (bsc#1174852).
- net: ena: enable the interrupt_moderation in driver_supported_features (bsc#1174852).
- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).
- net: ena: ethtool: get_channels: use combined only (bsc#1174852).
- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).
- net: ena: ethtool: support set_channels callback (bsc#1174852).
- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).
- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).
- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).
- net: ena: fix incorrect setting of the number of msix vectors (bsc#1174852).
- net: ena: fix incorrect update of intr_delay_resolution (bsc#1174852).
- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).
- net: ena: fix update of interrupt moderation register (bsc#1174852).
- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).
- net: ena: implement XDP drop support (bsc#1174852).
- net: ena: Implement XDP_TX action (bsc#1174852).
- net: ena: make ethtool -l show correct max number of queues (bsc#1174852).
- net: ena: Make missed_tx stat incremental (bsc#1083548).
- net: ena: Make some functions static (bsc#1174852).
- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).
- net: ena: multiple queue creation related cleanups (bsc#1174852).
- net: ena: Prevent reset after device destruction (bsc#1083548).
- net: ena: reduce driver load time (bsc#1174852).
- net: ena: remove all old adaptive rx interrupt moderation code from ena_com (bsc#1174852).
- net: ena: remove code duplication in ena_com_update_nonadaptive_moderation_interval _*() (bsc#1174852).
- net: ena: remove code that does nothing (bsc#1174852).
- net: ena: remove ena_restore_ethtool_params() and relevant fields (bsc#1174852).
- net: ena: remove old adaptive interrupt moderation code from ena_netdev (bsc#1174852).
- net: ena: remove redundant print of number of queues (bsc#1174852).
- net: ena: remove set but not used variable 'hash_key' (bsc#1174852).
- net: ena: remove set but not used variable 'rx_ring' (bsc#1174852).
- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).
- net: ena: Select DIMLIB for ENA_ETHERNET (bsc#1174852).
- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).
- net: ena: support new LLQ acceleration mode (bsc#1174852).
- net: ena: switch to dim algorithm for rx adaptive interrupt moderation (bsc#1174852).
- net: ena: use explicit variable size for clarity (bsc#1174852).
- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).
- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1174852).
- net: ena: xdp: XDP_TX: fix memory leak (bsc#1174852).
- net: ethernet: aquantia: Fix wrong return value (git-fixes).
- net: ethernet: broadcom: have drivers select DIMLIB as needed (bsc#1174852).
- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).
- net: fec: correct the error path for regulator disable in probe (git-fixes).
- netfilter: x_tables: add counters allocation wrapper (git-fixes).
- netfilter: x_tables: cap allocations at 512 mbyte (git-fixes).
- netfilter: x_tables: limit allocation requests for blob rule heads (git-fixes).
- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)
- net: fix memleak in register_netdevice() (networking-stable-20_06_28).
- net: Fix the arp error in some cases (networking-stable-20_06_28).
- net: gre: recompute gre csum for sctp over gre tunnels (git-fixes).
- net: hns3: add autoneg and change speed support for fibre port (bsc#1174070).
- net: hns3: add support for FEC encoding control (bsc#1174070).
- net: hns3: add support for multiple media type (bsc#1174070).
- net: hns3: fix a not link up issue when fibre port supports autoneg (bsc#1174070).
- net: hns3: fix for FEC configuration (bsc#1174070).
- net: hns3: fix port capbility updating issue (bsc#1174070).
- net: hns3: fix port setting handle for fibre port (bsc#1174070).
- net: hns3: fix selftest fail issue for fibre port with autoneg on (bsc#1174070).
- net: hns3: restore the MAC autoneg state after reset (bsc#1174070).
- net: increment xmit_recursion level in dev_direct_xmit() (networking-stable-20_06_28).
- net: ip6_gre: Request headroom in __gre6_xmit() (git-fixes).
- net: lan78xx: add missing endpoint sanity check (git-fixes).
- net: lan78xx: fix transfer-buffer memory leak (git-fixes).
- net: make symbol 'flush_works' static (git-fixes).
- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).
- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).
- net: netsec: Fix signedness bug in netsec_probe() (bsc#1175417).
- net: netsec: initialize tx ring on ndo_open (bsc#1175418).
- net: phy: Check harder for errors in get_phy_id() (bsc#1111666).
- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).
- net: Set fput_needed iff FDPUT_FPUT is set (git-fixes).
- net: socionext: Fix a signedness bug in ave_probe() (bsc#1175419).
- net: socionext: replace napi_alloc_frag with the netdev variant on init (bsc#1175420).
- net: spider_net: Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- net: stmmac: dwmac1000: provide multicast filter fallback (git-fixes).
- net: stmmac: Fix RX packet size > 8191 (git-fixes).
- net: udp: Fix wrong clean up for IS_UDPLITE macro (git-fixes).
- net: update net_dim documentation after rename (bsc#1174852).
- net: usb: ax88179_178a: fix packet alignment padding (networking-stable-20_06_28).
- net: usb: qmi_wwan: add support for Quectel EG95 LTE modem (networking-stable-20_07_17).
- netvsc: unshare skb in VF rx handler (git-fixes).
- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).
- ntb: Fix an error in get link status (git-fixes).
- ntb_netdev: fix sleep time mismatch (git-fixes).
- ntb: ntb_transport: Use scnprintf() for avoiding potential buffer overflow (git-fixes).
- nvme: fix possible deadlock when I/O is blocked (git-fixes).
- nvme-multipath: do not fall back to __nvme_find_path() for non-optimized paths (bsc#1172108).
- nvme-multipath: fix logic for non-optimized paths (bsc#1172108).
- nvme-multipath: round-robin: eliminate 'fallback' variable (bsc#1172108).
- nvme: multipath: round-robin: fix single non-optimized path case (bsc#1172108).
- obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).
- ocfs2: add trimfs dlm lock resource (bsc#1175228).
- ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: change slot number type s16 to u16 (bsc#1175786).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: fix remounting needed after setfacl command (bsc#1173954).
- ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).
- ocfs2: fix value of OCFS2_INVALID_SLOT (bsc#1175767).
- ocfs2: load global_inode_alloc (bsc#1172963).
- ocfs2: load global_inode_alloc (bsc#1172963).
- omapfb: dss: Fix max fclk divider for omap36xx (bsc#1113956)
- openvswitch: Prevent kernel-infoleak in ovs_ct_put_key() (git-fixes).
- PCI/ASPM: Add missing newline in sysfs 'policy' (git-fixes).
- PCI: dwc: Move interrupt acking into the proper callback (bsc#1175666).
- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).
- PCI: Fix 'try' semantics of bus and slot reset (git-fixes).
- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).
- PCI: hv: Fix a timing issue which causes kdump to fail occasionally (bsc#1172871, bsc#1172872, git-fixes).
- PCI: Release IVRS table in AMD ACS quirk (git-fixes).
- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).
- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).
- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).
- pinctrl: single: fix function name in documentation (git-fixes).
- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).
- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).
- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).
- PM / CPU: replace raw_notifier with atomic_notifier (git fixes (kernel/pm)).
- PM / devfreq: rk3399_dmc: Add missing of_node_put() (bsc#1175668).
- PM / devfreq: rk3399_dmc: Disable devfreq-event device when fails.
- PM / devfreq: rk3399_dmc: Fix kernel oops when rockchip,pmu is absent (bsc#1175668).
- PM: sleep: core: Fix the handling of pending runtime resume requests (git-fixes).
- powerpc/64s: Do not init FSCR_DSCR in __init_FSCR() (bsc#1065729).
- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).
- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).
- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).
- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).
- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).
- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).
- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).
- powerpc/perf: Fix missing is_sier_aviable() during build (bsc#1065729).
- powerpc/pseries: Do not initiate shutdown when system is running on UPS (bsc#1175440 ltc#187574).
- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).
- powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU death (bsc#1085030 ltC#165630).
- powerpc/pseries: PCIE PHB reset (bsc#1174689).
- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).
- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).
- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).
- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).
- propagate_one(): mnt_set_mountpoint() needs mount_lock (bsc#1174841).
- pseries: Fix 64 bit logical memory block panic (bsc#1065729).
- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).
- rds: Prevent kernel-infoleak in rds_notify_queue_get() (git-fixes).
- regulator: gpio: Honor regulator-boot-on property (git-fixes).
- Revert 'ALSA: hda: call runtime_allow() for all hda controllers' (bsc#1111666).
- Revert 'drm/amdgpu: Fix NULL dereference in dpm sysfs handlers' (bsc#1113956) * refresh for context changes
- Revert 'ocfs2: avoid inode removal while nfsd is accessing it' This reverts commit 9e096c72476eda333a9998ff464580c00ff59c83.
- Revert 'ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).' This reverts commit 0bf6e248f93736b3f17f399b4a8f64ffa30d371e.
- Revert 'ocfs2: load global_inode_alloc (bsc#1172963).' This reverts commit fc476497b53f967dc615b9cbad9427ba3107b5c4.
- Revert pciehp patches that broke booting (bsc#1174887)
- Revert 'scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe' (bsc#1171688 bsc#1174003).
- Revert 'scsi: qla2xxx: Fix crash on qla2x00_mailbox_command' (bsc#1171688 bsc#1174003).
- Revert 'sign also s390x kernel images (bsc#1163524)' This reverts commit b38b61155f0a2c3ebca06d4bb0c2e11a19a87f1f.
- Revert 'xen/balloon: Fix crash when ballooning on x86 32 bit PAE' (bsc#1065600).
- rocker: fix incorrect error handling in dma_rings_init (networking-stable-20_06_28).
- rpm/check-for-config-changes: Ignore CONFIG_CC_VERSION_TEXT
- rpm/check-for-config-changes: Ignore CONFIG_LD_VERSION
- rpm/constraints.in: Increase memory for kernel-docs References: https://build.opensuse.org/request/show/792664
- rpm: drop execute permissions on source files Sometimes a source file with execute permission appears in upstream repository and makes it into our kernel-source packages. This is caught by OBS build checks and may even result in build failures. Sanitize the source tree by removing execute permissions from all C source and header files.
- rpm/kabi.pl: account for namespace field being moved last Upstream is moving the namespace field in Module.symvers last in order to preserve backwards compatibility with kmod tools (depmod, etc). Fix the kabi.pl script to expect the namespace field last. Since split() ignores trailing empty fields and delimeters, switch to using tr to count how many fields/tabs are in a line. Also, in load_symvers(), pass LIMIT of -1 to split() so it does not strip trailing empty fields, as namespace is an optional field.
- rpm/kernel-binary.spec.in: do not run klp-symbols for configs with no modules Starting with 5.8-rc1, s390x/zfcpdump builds fail because rpm/klp-symbols script does not find .tmp_versions directory. This is missing because s390x/zfcpdump is built without modules (CONFIG_MODULES disabled). As livepatching cannot work without modules, the cleanest solution is setting %klp_symbols to 0 if CONFIG_MODULES is disabled. (We cannot simply add another condition to the place where %klp_symbols is set as it can be already set to 1 from prjconf.)
- rpm/kernel-binary.spec.in: restrict livepatch metapackage to default flavor It has been reported that the kernel-*-livepatch metapackage got erroneously enabled for SLE15-SP3's new -preempt flavor, leading to a unresolvable dependency to a non-existing kernel-livepatch-x.y.z-preempt package. As SLE12 and SLE12-SP1 have run out of livepatching support, the need to build said metapackage for the -xen flavor is gone and the only remaining flavor for which they're still wanted is -default. Restrict the build of the kernel-*-livepatch metapackage to the -default flavor.
- rpm/kernel-obs-build.spec.in: add dm-crypt for building with cryptsetup Co-Authored-By: Adam Spiers <aspiers@suse.com>
- rpm/kernel-obs-build.spec.in: Enable overlayfs Overlayfs is needed for podman or docker builds when no more specific driver can be used (like lvm or btrfs). As the default build fs is ext4 currently, we need overlayfs kernel modules to be available.
- rpm/kernel-source.spec.in: Add obsolete_rebuilds (boo#1172073).
- rpm/mkspec-dtb: add mt76 based dtb package
- rpm/package-descriptions: garbege collection remove old ARM and Xen flavors.
- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).
- s390, dcssblk: kaddr and pfn can be NULL to ->direct_access() (bsc#1174873).
- sched: consistently handle layer3 header accesses in the presence of VLANs (networking-stable-20_07_17).
- scsi: dh: Add Fujitsu device to devinfo and dh lists (bsc#1174026).
- scsi: Fix trivial spelling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Address a set of sparse warnings (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change {RD,WRT}_REG_*() function names from upper case into lower case (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in header files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in source files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix issue with adapter's stopping state (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix login timeout (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix null pointer access during disconnect from subsystem (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix spelling of a variable name (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix warning after FC target reset (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush all sessions on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush I/O on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Initialize 'n' before using it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce noisy debug message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove an unused function (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove a superfluous cast (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: SAN congestion management implementation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use register names instead of register offsets (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for ha->fw_dumped (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1171688 bsc#1174003).
- scsi: smartpqi: add bay identifier (bsc#1172418).
- scsi: smartpqi: add gigabyte controller (bsc#1172418).
- scsi: smartpqi: add id support for SmartRAID 3152-8i (bsc#1172418).
- scsi: smartpqi: add inquiry timeouts (bsc#1172418).
- scsi: smartpqi: add module param for exposure order (bsc#1172418).
- scsi: smartpqi: add module param to hide vsep (bsc#1172418).
- scsi: smartpqi: add new pci ids (bsc#1172418).
- scsi: smartpqi: add pci ids for fiberhome controller (bsc#1172418).
- scsi: smartpqi: add RAID bypass counter (bsc#1172418).
- scsi: smartpqi: add sysfs entries (bsc#1172418).
- scsi: smartpqi: Align driver syntax with oob (bsc#1172418).
- scsi: smartpqi: avoid crashing kernel for controller issues (bsc#1172418).
- scsi: smartpqi: bump version (bsc#1172418).
- scsi: smartpqi: bump version (bsc#1172418).
- scsi: smartpqi: bump version to 1.2.16-010 (bsc#1172418).
- scsi: smartpqi: change TMF timeout from 60 to 30 seconds (bsc#1172418).
- scsi: smartpqi: correct hang when deleting 32 lds (bsc#1172418).
- scsi: smartpqi: correct REGNEWD return status (bsc#1172418).
- scsi: smartpqi: correct syntax issue (bsc#1172418).
- scsi: smartpqi: fix call trace in device discovery (bsc#1172418).
- scsi: smartpqi: fix controller lockup observed during force reboot (bsc#1172418).
- scsi: smartpqi: fix LUN reset when fw bkgnd thread is hung (bsc#1172418).
- scsi: smartpqi: fix problem with unique ID for physical device (bsc#1172418).
- scsi: smartpqi: identify physical devices without issuing INQUIRY (bsc#1172418).
- scsi: smartpqi: properly set both the DMA mask and the coherent DMA mask (bsc#1172418).
- scsi: smartpqi: remove unused manifest constants (bsc#1172418).
- scsi: smartpqi: Reporting unhandled SCSI errors (bsc#1172418).
- scsi: smartpqi: support device deletion via sysfs (bsc#1172418).
- scsi: smartpqi: update copyright (bsc#1172418).
- scsi: smartpqi: update logical volume size after expansion (bsc#1172418).
- scsi: smartpqi: Use scnprintf() for avoiding potential buffer overflow (bsc#1172418).
- scsi: storvsc: Correctly set number of hardware queues for IDE disk (git-fixes).
- scsi: target/iblock: fix WRITE SAME zeroing (bsc#1169790).
- sctp: Do not advertise IPv4 addresses if ipv6only is set on the socket (networking-stable-20_06_28).
- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).
- serial: 8250: change lock order in serial8250_do_startup() (git-fixes).
- serial: pl011: Do not leak amba_ports entry on driver register error (git-fixes).
- serial: pl011: Fix oops on -EPROBE_DEFER (git-fixes).
- Set VIRTIO_CONSOLE=y (bsc#1175667).
- sign also s390x kernel images (bsc#1163524)
- soc: fsl: qbman: allow registering a device link for the portal user (bsc#1174550).
- soc: fsl: qbman_portals: add APIs to retrieve the probing status (bsc#1174550).
- spi: davinci: Remove uninitialized_var() usage (git-fixes).
- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).
- spi: nxp-fspi: Ensure width is respected in spi-mem operations (bsc#1175421).
- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1175422).
- spi: spi-mem: export spi_mem_default_supports_op() (bsc#1175421).
- staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).
- staging: fsl-dpaa2: ethsw: Add missing netdevice check (bsc#1175423).
- staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).
- staging/speakup: fix get_word non-space look-ahead (git-fixes).
- tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT (networking-stable-20_06_28).
- tcp: grow window for OOO packets only for SACK flows (networking-stable-20_06_28).
- tcp: make sure listeners do not initialize congestion-control state (networking-stable-20_07_17).
- tcp: md5: add missing memory barriers in tcp_md5_do_add()/tcp_md5_hash_key() (networking-stable-20_07_17).
- tcp: md5: do not send silly options in SYNCOOKIES (networking-stable-20_07_17).
- tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key() barriers (networking-stable-20_07_17).
- tracepoint: Mark __tracepoint_string's __used (git-fixes).
- tracing: Use trace_sched_process_free() instead of exit() for pid tracing (git-fixes).
- tty: serial: fsl_lpuart: add imx8qxp support (bsc#1175670).
- tty: serial: fsl_lpuart: free IDs allocated by IDA (bsc#1175670).
- Update patch reference for a tipc fix patch (bsc#1175515)
- USB: cdc-acm: rework notification_buffer resizing (git-fixes).
- USB: gadget: f_tcm: Fix some resource leaks in some error paths (git-fixes).
- USB: host: ohci-exynos: Fix error handling in exynos_ohci_probe() (git-fixes).
- USB: Ignore UAS for JMicron JMS567 ATA/ATAPI Bridge (git-fixes).
- USB: iowarrior: fix up report size handling for some devices (git-fixes).
- USBip: tools: fix module name in man page (git-fixes).
- USB: rename USB quirk to USB_QUIRK_ENDPOINT_IGNORE (git-fixes).
- USB: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).
- USB: serial: cp210x: re-enable auto-RTS on open (git-fixes).
- USB: serial: ftdi_sio: clean up receive processing (git-fixes).
- USB: serial: ftdi_sio: fix break and sysrq handling (git-fixes).
- USB: serial: ftdi_sio: make process-packet buffer unsigned (git-fixes).
- USB: serial: iuu_phoenix: fix led-activity helpers (git-fixes).
- USB: serial: qcserial: add EM7305 QDL product ID (git-fixes).
- USB: xhci: define IDs for various ASMedia host controllers (git-fixes).
- USB: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).
- USB: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).
- USB: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).
- VFS: Check rename_lock in lookup_fast() (bsc#1174734).
- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).
- video: pxafb: Fix the function used to balance a 'dma_alloc_coherent()' call (git-fixes).
- vlan: consolidate VLAN parsing code and limit max parsing depth (networking-stable-20_07_17).
- vmxnet3: use correct tcp hdr length when packet is encapsulated (bsc#1175199).
- vt_compat_ioctl(): clean up, use compat_ptr() properly (git-fixes).
- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).
- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (bsc#1111666).
- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (bsc#1111666).
- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (bsc#1111666).
- wl1251: fix always return 0 error (git-fixes).
- x86/hyperv: Create and use Hyper-V page definitions (git-fixes).
- x86/hyper-v: Fix overflow bug in fill_gva_list() (git-fixes).
- x86/hyperv: Make hv_vcpu_is_preempted() visible (git-fixes).
- xen/balloon: fix accounting in alloc_xenballooned_pages error path (bsc#1065600).
- xen/balloon: make the balloon wait interruptible (bsc#1065600).
- xfrm: check id proto in validate_tmpl() (git-fixes).
- xfrm: clean up xfrm protocol checks (git-fixes).
- xfrm_user: uncoditionally validate esn replay attribute struct (git-fixes).
- xfs: fix inode allocation block res calculation precedence (git-fixes).
- xfs: fix reflink quota reservation accounting error (git-fixes).
- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).
Patchnames
SUSE-2020-2540,SUSE-SLE-SERVER-12-SP5-2020-2540
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup (bsc#1165629).\n- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).\n- CVE-2020-14356: Fixed a null pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213).\n- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).\n- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).\n- CVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).\n\nThe following non-security bugs were fixed:\n\n- ACPI: kABI fixes for subsys exports (bsc#1174968).\n- ACPI / LPSS: Resume BYT/CHT I2C controllers from resume_noirq (bsc#1174968).\n- ACPI / LPSS: Use acpi_lpss_* instead of acpi_subsys_* functions for hibernate (bsc#1174968).\n- ACPI: PM: Introduce \u0027poweroff\u0027 callbacks for ACPI PM domain and LPSS (bsc#1174968).\n- ACPI: PM: Simplify and fix PM domain hibernation callbacks (bsc#1174968).\n- af_key: pfkey_dump needs parameter validation (git-fixes).\n- agp/intel: Fix a memory leak on module initialisation failure (git-fixes).\n- ALSA: core: pcm_iec958: fix kernel-doc (bsc#1111666).\n- ALSA: echoaduio: Drop superfluous volatile modifier (bsc#1111666).\n- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (bsc#1111666).\n- ALSA: hda: Add support for Loongson 7A1000 controller (bsc#1111666).\n- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (bsc#1111666).\n- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (bsc#1111666).\n- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (bsc#1111666).\n- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).\n- ALSA: hda: fix snd_hda_codec_cleanup() documentation (bsc#1111666).\n- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (bsc#1111666).\n- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (bsc#1111666).\n- ALSA: hda/realtek: Add model alc298-samsung-headphone (git-fixes).\n- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for Lenovo Carbon X1 8th gen (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for MSI GL63 (bsc#1111666).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex Book (git-fixes).\n- ALSA: hda/realtek - change to suitable link model for ASUS platform (bsc#1111666).\n- ALSA: hda/realtek - Check headset type by unplug and resume (bsc#1111666).\n- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (bsc#1111666).\n- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (bsc#1111666).\n- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (bsc#1111666).\n- ALSA: hda/realtek: Fix add a \u0027ultra_low_power\u0027 function for intel reference board (alc256) (bsc#1111666).\n- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (bsc#1111666).\n- ALSA: hda/realtek - Fixed HP right speaker no sound (bsc#1111666).\n- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (bsc#1111666).\n- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (bsc#1111666).\n- ALSA: hda/realtek - Fix unused variable warning (bsc#1111666).\n- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (bsc#1111666).\n- ALSA: hda - reverse the setting value in the micmute_led_set (bsc#1111666).\n- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).\n- ALSA: pci: delete repeated words in comments (bsc#1111666).\n- ALSA: seq: oss: Serialize ioctls (bsc#1111666).\n- ALSA: usb-audio: Add capture support for Saffire 6 (USB 1.1) (git-fixes).\n- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (bsc#1111666).\n- ALSA: usb-audio: add startech usb audio dock name (bsc#1111666).\n- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (bsc#1111666).\n- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (bsc#1111666).\n- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (bsc#1111666).\n- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (bsc#1111666).\n- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).\n- ALSA: usb-audio: fix spelling mistake \u0027buss\u0027 -\u003e \u0027bus\u0027 (bsc#1111666).\n- ALSA: usb-audio: ignore broken processing/extension unit (git-fixes).\n- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (bsc#1111666).\n- ALSA: usb/line6: remove \u0027defined but not used\u0027 warning (bsc#1111666).\n- arm64: Add MIDR encoding for HiSilicon Taishan CPUs (bsc#1174547).\n- arm64: Add MIDR encoding for NVIDIA CPUs (bsc#1174547).\n- arm64: add sysfs vulnerability show for meltdown (bsc#1174547).\n- arm64: Add sysfs vulnerability show for spectre-v1 (bsc#1174547).\n- arm64: add sysfs vulnerability show for spectre-v2 (bsc#1174547).\n- arm64: add sysfs vulnerability show for speculative store bypass (bsc#1174547). \n- arm64: Advertise mitigation of Spectre-v2, or lack thereof (bsc#1174547). \n- arm64: Always enable spectre-v2 vulnerability detection (bsc#1174547). \n- arm64: Always enable ssb vulnerability detection (bsc#1174547). \n- arm64: backtrace: Do not bother trying to unwind the userspace stack (bsc#1175397).\n- arm64: capabilities: Add NVIDIA Denver CPU to bp_harden list (bsc#1174547).\n- arm64: capabilities: Merge duplicate Cavium erratum entries (bsc#1174547).\n- arm64: capabilities: Merge entries for ARM64_WORKAROUND_CLEAN_CACHE (bsc#1174547). Update config/arm64/default \n- arm64: cpufeature: Enable Qualcomm Falkor/Kryo errata 1003 (bsc#1175398).\n- arm64: Do not mask out PTE_RDONLY in pte_same() (bsc#1175393).\n- arm64: enable generic CPU vulnerabilites support (bsc#1174547). Update config/arm64/default\n- arm64: Ensure VM_WRITE|VM_SHARED ptes are clean by default (bsc#1175394).\n- arm64: errata: Do not define type field twice for arm64_errata entries (bsc#1174547).\n- arm64: errata: Update stale comment (bsc#1174547).\n- arm64: Get rid of __smccc_workaround_1_hvc_* (bsc#1174547).\n- arm64: kpti: Avoid rewriting early page tables when KASLR is enabled (bsc#1174547).\n- arm64: kpti: Update arm64_kernel_use_ng_mappings() when forced on (bsc#1174547).\n- arm64: kpti: Whitelist Cortex-A CPUs that do not implement the CSV3 field (bsc#1174547).\n- arm64: kpti: Whitelist HiSilicon Taishan v110 CPUs (bsc#1174547).\n- arm64: KVM: Avoid setting the upper 32 bits of VTCR_EL2 to 1 (bsc#1133021).\n- arm64: KVM: Guests can skip __install_bp_hardening_cb()s HYP work (bsc#1174547).\n- arm64: KVM: Use SMCCC_ARCH_WORKAROUND_1 for Falkor BP hardening (bsc#1174547). \n- arm64: mm: Fix pte_mkclean, pte_mkdirty semantics (bsc#1175526). \n- arm64: Provide a command line to disable spectre_v2 mitigation (bsc#1174547).\n- arm64: Silence clang warning on mismatched value/register sizes (bsc#1175396).\n- arm64/speculation: Support \u0027mitigations=\u0027 cmdline option (bsc#1174547). \n- arm64: ssbd: explicitly depend on \u003clinux/prctl.h\u003e (bsc#1175399).\n- arm64: ssbs: Do not treat CPUs with SSBS as unaffected by SSB (bsc#1174547).\n- arm64: ssbs: Fix context-switch when SSBS is present on all CPUs (bsc#1175669).\n- arm64/sve: Fix wrong free for task-\u003ethread.sve_state (bsc#1175400).\n- arm64/sve: \u003cuapi/asm/ptrace.h\u003e should not depend on \u003cuapi/linux/prctl.h\u003e (bsc#1175401).\n- arm64: tlbflush: avoid writing RES0 bits (bsc#1175402).\n- arm64: Use firmware to detect CPUs that are not affected by Spectre-v2 (bsc#1174547).\n- ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17 (bsc#1133021). \n- ARM: KVM: invalidate icache on guest exit for Cortex-A15 (bsc#1133021).\n- ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15 (bsc#1133021).\n- ASoC: hda/tegra: Set buffer alignment to 128 bytes (bsc#1111666).\n- ASoC: intel: Fix memleak in sst_media_open (git-fixes).\n- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).\n- AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).\n- AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).\n- AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).\n- ax88172a: fix ax88172a_unbind() failures (git-fixes).\n- b43: Remove uninitialized_var() usage (git-fixes).\n- bcache: allocate meta data pages as compound pages (bsc#1172873).\n- bcache: allocate meta data pages as compound pages (bsc#1172873).\n- block: check queue\u0027s limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).\n- block: check queue\u0027s limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).\n- block: Fix use-after-free in blkdev_get() (bsc#1174843).\n- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).\n- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).\n- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (bsc#1111666).\n- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (bsc#1111666).\n- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (bsc#1111666).\n- bonding: fix active-backup failover for current ARP slave (bsc#1174771).\n- bonding: fix a potential double-unregister (git-fixes).\n- bonding: show saner speed for broadcast mode (git-fixes).\n- bpf: Fix map leak in HASH_OF_MAPS map (git-fixes).\n- brcmfmac: keep SDIO watchdog running when console_interval is non-zero (bsc#1111666).\n- brcmfmac: set state of hanger slot to FREE when flushing PSQ (bsc#1111666).\n- brcmfmac: To fix Bss Info flag definition Bug (bsc#1111666).\n- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).\n- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).\n- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).\n- btrfs: fix block group leak when removing fails (bsc#1175149).\n- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).\n- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).\n- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).\n- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).\n- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).\n- btrfs: fix memory leaks after failure to lookup checksums during inode logging (bsc#1175550).\n- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).\n- btrfs: fix race between block group removal and block group creation (bsc#1175149).\n- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).\n- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).\n- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).\n- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).\n- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).\n- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).\n- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).\n- btrfs: Open code btrfs_write_and_wait_marked_extents (bsc#1175149).\n- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).\n- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).\n- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).\n- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).\n- btrfs: Rename and export clear_btree_io_tree (bsc#1175149).\n- btrfs: treat RWF_{,D}SYNC writes as sync for CRCs (bsc#1175493).\n- bus: hisi_lpc: Add .remove method to avoid driver unbind crash (bsc#1174658).\n- bus: hisi_lpc: Do not fail probe for unrecognised child devices (bsc#1174658).\n- bus: hisi_lpc: Unregister logical PIO range to avoid potential use-after-free (bsc#1174658).\n- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).\n- cfg80211: check vendor command doit pointer before use (git-fixes).\n- char: virtio: Select VIRTIO from VIRTIO_CONSOLE (bsc#1175667).\n- cifs: document and cleanup dfs mount (bsc#1144333 bsc#1172428).\n- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1144333 bsc#1172428).\n- cifs: fix double free error on share and prefix (bsc#1144333 bsc#1172428).\n- cifs: handle empty list of targets in cifs_reconnect() (bsc#1144333 bsc#1172428).\n- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1144333 bsc#1172428).\n- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1144333 bsc#1172428).\n- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1144333 bsc#1172428).\n- cifs: reduce number of referral requests in DFS link lookups (bsc#1144333 bsc#1172428).\n- cifs: rename reconn_inval_dfs_target() (bsc#1144333 bsc#1172428).\n- clk: at91: clk-generated: check best_rate against ranges (bsc#1111666).\n- clk: clk-atlas6: fix return value check in atlas6_clk_init() (bsc#1111666).\n- clk: iproc: round clock rate to the closest (bsc#1111666).\n- clk: spear: Remove uninitialized_var() usage (git-fixes).\n- clk: st: Remove uninitialized_var() usage (git-fixes).\n- console: newport_con: fix an issue about leak related system resources (git-fixes).\n- constrants: fix malformed XML Closing tag of an element is \u0027\u003c/foo\u003e\u0027, not \u0027\u003cfoo/\u003e\u0027. Fixes: 8b37de2eb835 (\u0027rpm/constraints.in: Increase memory for kernel-docs\u0027)\n- Created new preempt kernel flavor (jsc#SLE-11309) Configs are cloned from the respective $arch/default configs. All changed configs appart from CONFIG_PREEMPT-\u003ey are a result of dependencies, namely many lock/unlock primitives are no longer inlined in the preempt kernel. TREE_RCU has been also changed to PREEMPT_RCU which is the default implementation for PREEMPT kernel.\n- crypto: ccp - Fix use of merged scatterlists (git-fixes).\n- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).\n- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).\n- crypto: rockchip - fix scatterlist nents error (git-fixes).\n- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).\n- crypto: talitos - check AES key size (git-fixes).\n- crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK (git-fixes).\n- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- dev: Defer free of skbs in flush_backlog (git-fixes).\n- device property: Fix the secondary firmware node handling in set_primary_fwnode() (git-fixes).\n- devres: keep both device name and resource name in pretty name (git-fixes).\n- dlm: Fix kobject memleak (bsc#1175768).\n- dlm: remove BUG() before panic() (bsc#1174844).\n- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).\n- Documentation/networking: Add net DIM documentation (bsc#1174852).\n- dpaa2-eth: Fix passing zero to \u0027PTR_ERR\u0027 warning (bsc#1175403).\n- dpaa2-eth: free already allocated channels on probe defer (bsc#1175404).\n- dpaa2-eth: prevent array underflow in update_cls_rule() (bsc#1175405).\n- dpaa_eth: add dropped frames to percpu ethtool stats (bsc#1174550).\n- dpaa_eth: add newline in dev_err() msg (bsc#1174550).\n- dpaa_eth: avoid timestamp read on error paths (bsc#1175406).\n- dpaa_eth: change DMA device (bsc#1174550).\n- dpaa_eth: cleanup skb_to_contig_fd() (bsc#1174550).\n- dpaa_eth: defer probing after qbman (bsc#1174550).\n- dpaa_eth: extend delays in ndo_stop (bsc#1174550).\n- dpaa_eth: fix DMA mapping leak (bsc#1174550).\n- dpaa_eth: Fix one possible memleak in dpaa_eth_probe (bsc#1174550).\n- dpaa_eth: FMan erratum A050385 workaround (bsc#1174550).\n- dpaa_eth: perform DMA unmapping before read (bsc#1175407).\n- dpaa_eth: register a device link for the qman portal used (bsc#1174550).\n- dpaa_eth: remove netdev_err() for user errors (bsc#1174550).\n- dpaa_eth: remove redundant code (bsc#1174550).\n- dpaa_eth: simplify variables used in dpaa_cleanup_tx_fd() (bsc#1174550).\n- dpaa_eth: use a page to store the SGT (bsc#1174550).\n- dpaa_eth: use fd information in dpaa_cleanup_tx_fd() (bsc#1174550).\n- dpaa_eth: use only one buffer pool per interface (bsc#1174550).\n- dpaa_eth: use page backed rx buffers (bsc#1174550).\n- driver core: Avoid binding drivers to dead devices (git-fixes).\n- Drivers: hv: balloon: Remove dependencies on guest page size (git-fixes).\n- Drivers: hv: vmbus: Fix virt_to_hvpfn() for X86_PAE (git-fixes).\n- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127, bsc#1175128).\n- Drivers: hv: vmbus: Remove the undesired put_cpu_ptr() in hv_synic_cleanup() (git-fixes).\n- drivers/perf: hisi: Fix typo in events attribute array (bsc#1175408).\n- drivers/perf: hisi: Fixup one DDRC PMU register offset (bsc#1175410).\n- drivers/perf: hisi: Fix wrong value for all counters enable (bsc#1175409).\n- drm: Added orientation quirk for ASUS tablet model T103HAF (bsc#1111666).\n- drm/amd/display: fix pow() crashing when given base 0 (git-fixes).\n- drm/amdgpu: avoid dereferencing a NULL pointer (bsc#1111666).\n- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (bsc#1111666).\n- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (bsc#1113956) \t* refresh for context changes\n- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).\n- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1113956)\n- drm/arm: fix unintentional integer overflow on left shift (git-fixes).\n- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1113956) \t* refreshed for context changes\n- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).\n- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1113956) \t* move drm_mipi_dbi.c -\u003e tinydrm/mipi-drm.c \t* refresh for context changes\n- drm/debugfs: fix plain echo to connector \u0027force\u0027 attribute (bsc#1111666).\n- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).\n- drm/etnaviv: fix ref count leak via pm_runtime_get_sync (bsc#1111666).\n- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (bsc#1112178) \t* updated names of get/put functions\n- drm: hold gem reference until object is no longer accessed (bsc#1113956)\n- drm/imx: fix use after free (git-fixes).\n- drm/imx: imx-ldb: Disable both channels for split mode in enc-\u003edisable() (git-fixes).\n- drm/imx: tve: fix regulator_disable error path (git-fixes).\n- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).\n- drm/msm/adreno: fix updating ring fence (git-fixes).\n- drm/msm: ratelimit crtc event overflow error (bsc#1111666).\n- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).\n- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).\n- drm/nouveau: fix multiple instances of reference count leaks (bsc#1111666).\n- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).\n- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).\n- drm/radeon: disable AGP by default (bsc#1111666).\n- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).\n- drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync (bsc#1111666).\n- drm/rockchip: fix VOP_WIN_GET macro (bsc#1175411).\n- drm/tilcdc: fix leak \u0026 null ref in panel_connector_get_modes (bsc#1111666).\n- drm/ttm/nouveau: do not call tt destroy callback on alloc failure (bsc#1175232).\n- drm/vmwgfx: Fix two list_for_each loop exit tests (bsc#1111666).\n- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (bsc#1111666).\n- drm/xen-front: Fix misused IS_ERR_OR_NULL checks (bsc#1065600).\n- efi/memreserve: deal with memreserve entries in unmapped memory (bsc#1174685).\n- ext4: check journal inode extents more carefully (bsc#1173485).\n- ext4: do not allow overlapping system zones (bsc#1173485).\n- ext4: fix checking of directory entry validity for inline directories (bsc#1175771).\n- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1174840).\n- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).\n- fat: do not allow to mount if the FAT length == 0 (bsc#1174845).\n- fbdev: Detect integer underflow at \u0027struct fbcon_ops\u0027-\u003eclear_margins. (bsc#1112178) \t* move files drivers/video/fbdev/core -\u003e drivers/video/console \t* refresh for context changes\n- firmware: google: check if size is valid when decoding VPD data (git-fixes).\n- firmware: google: increment VPD key_len properly (git-fixes).\n- fpga: dfl: fix bug in port reset handshake (git-fixes).\n- fsl/fman: add API to get the device behind a fman port (bsc#1174550).\n- fsl/fman: check dereferencing null pointer (git-fixes).\n- fsl/fman: detect FMan erratum A050385 (bsc#1174550).\n- fsl/fman: do not touch liodn base regs reserved on non-PAMU SoCs (bsc#1174550).\n- fsl/fman: fix dereference null return value (git-fixes).\n- fsl/fman: fix eth hash table allocation (git-fixes).\n- fsl/fman: fix unreachable code (git-fixes).\n- fsl/fman: remove unused struct member (bsc#1174550).\n- fsl/fman: use 32-bit unsigned integer (git-fixes).\n- fuse: fix memleak in cuse_channel_open (bsc#1174926).\n- fuse: fix missing unlock_page in fuse_writepage() (bsc#1174904).\n- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175062).\n- fuse: fix weird page warning (bsc#1175063).\n- fuse: flush dirty data/metadata before non-truncate setattr (bsc#1175064).\n- fuse: truncate pending writes on O_TRUNC (bsc#1175065).\n- fuse: verify attributes (bsc#1175066).\n- fuse: verify nlink (bsc#1175067).\n- genetlink: remove genl_bind (networking-stable-20_07_17).\n- go7007: add sanity checking for endpoints (git-fixes).\n- gpu: host1x: debug: Fix multiple channels emitting messages simultaneously (bsc#1111666).\n- HID: hiddev: fix mess in hiddev_open() (git-fixes).\n- HISI LPC: Re-Add ACPI child enumeration support (bsc#1174658).\n- HISI LPC: Stop using MFD APIs (bsc#1174658).\n- hv_balloon: Balloon up according to request page number (git-fixes).\n- hv_balloon: Use a static page for the balloon_up send buffer (git-fixes).\n- hv_netvsc: Allow scatter-gather feature to be tunable (git-fixes).\n- hv_netvsc: do not use VF device if link is down (git-fixes).\n- hv_netvsc: Fix a warning of suspicious RCU usage (git-fixes).\n- hv_netvsc: Fix error handling in netvsc_attach() (git-fixes).\n- hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (git-fixes).\n- hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (git-fixes).\n- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (git-fixes).\n- hv_netvsc: flag software created hash value (git-fixes).\n- hv_netvsc: Remove \u0027unlikely\u0027 from netvsc_select_queue (git-fixes).\n- i2c: rcar: in slave mode, clear NACK earlier (git-fixes).\n- i2c: rcar: slave: only send STOP event when we have been addressed (bsc#1111666).\n- i40e: Fix crash during removing i40e driver (git-fixes).\n- i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (git-fixes).\n- ibmveth: Fix use of ibmveth in a bridge (bsc#1174387 ltc#187506).\n- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).\n- ibmvnic fix NULL tx_pools and rx_tools issue at do_reset (bsc#1175873 ltc#187922).\n- include/linux/poison.h: remove obsolete comment (git fixes (poison)).\n- Input: psmouse - add a newline when printing \u0027proto\u0027 by sysfs (git-fixes).\n- Input: sentelic - fix error return when fsp_reg_write fails (bsc#1111666).\n- integrity: remove redundant initialization of variable ret (git-fixes).\n- io-mapping: indicate mapping failure (git-fixes).\n- ip6_gre: fix null-ptr-deref in ip6gre_init_net() (git-fixes).\n- ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() (networking-stable-20_06_28).\n- ip6_tunnel: allow not to count pkts on tstats by passing dev as NULL (bsc#1175515).\n- ip_tunnel: allow not to count pkts on tstats by setting skb\u0027s dev to NULL (bsc#1175515).\n- ip_tunnel: Emit events for post-register MTU changes (git-fixes).\n- ip_tunnel: fix use-after-free in ip_tunnel_lookup() (networking-stable-20_06_28).\n- ip_tunnel: restore binding to ifaces with a large mtu (git-fixes).\n- ipv4: fill fl4_icmp_{type,code} in ping_v4_sendmsg (networking-stable-20_07_17).\n- ipv4: Silence suspicious RCU usage warning (git-fixes).\n- ipv6: fix memory leaks on IPV6_ADDRFORM path (git-fixes).\n- ipvlan: fix device features (git-fixes).\n- ipvs: allow connection reuse for unconfirmed conntrack (git-fixes).\n- ipvs: fix refcount usage for conns in ops mode (git-fixes).\n- ipvs: fix the connection sync failed in some cases (bsc#1174699).\n- irqchip/gic: Atomically update affinity (bsc#1111666).\n- iwlegacy: Check the return value of pcie_capability_read_*() (bsc#1111666).\n- jbd2: add the missing unlock_buffer() in the error path of jbd2_write_superblock() (bsc#1175772).\n- kabi: genetlink: remove genl_bind (kabi).\n- kabi: hide new parameter of ip6_dst_lookup_flow() (bsc#1165629).\n- kabi: mask changes to struct ipv6_stub (bsc#1165629).\n- kernel/cpu_pm: Fix uninitted local in cpu_pm (git fixes (kernel/pm)).\n- kernel-docs: Change Requires on python-Sphinx to earlier than version 3 References: bsc#1166965 From 3 on the internal API that the build system uses was rewritten in an incompatible way. See https://github.com/sphinx-doc/sphinx/issues/7421 and https://bugzilla.suse.com/show_bug.cgi?id=1166965#c16 for some details.\n- kernel/relay.c: fix memleak on destroy relay channel (git-fixes).\n- kernfs: do not call fsnotify() with name without a parent (bsc#1175770).\n- KVM: arm64: Ensure \u0027params\u0027 is initialised when looking up sys register (bsc#1133021).\n- KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART (bsc#1133021).\n- KVM: arm/arm64: Fix young bit from mmu notifier (bsc#1133021).\n- KVM: arm/arm64: vgic: Do not rely on the wrong pending table (bsc#1133021).\n- KVM: arm/arm64: vgic-its: Fix restoration of unmapped collections (bsc#1133021).\n- KVM: arm: Fix DFSR setting for non-LPAE aarch32 guests (bsc#1133021).\n- KVM: arm: Make inject_abt32() inject an external abort instead (bsc#1133021).\n- kvm: Change offset in kvm_write_guest_offset_cached to unsigned (bsc#1133021).\n- KVM: Check for a bad hva before dropping into the ghc slow path (bsc#1133021).\n- KVM: PPC: Book3S PR: Remove uninitialized_var() usage (bsc#1065729).\n- l2tp: remove skb_dst_set() from l2tp_xmit_skb() (networking-stable-20_07_17).\n- leds: 88pm860x: fix use-after-free on unbind (git-fixes).\n- leds: core: Flush scheduled work for system suspend (git-fixes).\n- leds: da903x: fix use-after-free on unbind (git-fixes).\n- leds: lm3533: fix use-after-free on unbind (git-fixes).\n- leds: lm355x: avoid enum conversion warning (git-fixes).\n- leds: wm831x-status: fix use-after-free on unbind (git-fixes).\n- lib/dim: Fix -Wunused-const-variable warnings (bsc#1174852).\n- lib: dimlib: fix help text typos (bsc#1174852).\n- lib: logic_pio: Add logic_pio_unregister_range() (bsc#1174658).\n- lib: logic_pio: Avoid possible overlap for unregistering regions (bsc#1174658).\n- lib: logic_pio: Fix RCU usage (bsc#1174658).\n- linux/dim: Add completions count to dim_sample (bsc#1174852).\n- linux/dim: Fix overflow in dim calculation (bsc#1174852).\n- linux/dim: Move implementation to .c files (bsc#1174852).\n- linux/dim: Move logic to dim.h (bsc#1174852).\n- linux/dim: Remove \u0027net\u0027 prefix from internal DIM members (bsc#1174852).\n- linux/dim: Rename externally exposed macros (bsc#1174852).\n- linux/dim: Rename externally used net_dim members (bsc#1174852).\n- linux/dim: Rename net_dim_sample() to net_dim_update_sample() (bsc#1174852).\n- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).\n- llc: make sure applications use ARPHRD_ETHER (networking-stable-20_07_17).\n- mac80211: mesh: Free ie data when leaving mesh (git-fixes).\n- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).\n- MAINTAINERS: add entry for Dynamic Interrupt Moderation (bsc#1174852).\n- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (git-fixes).\n- md/raid5: Fix Force reconstruct-write io stuck in degraded raid5 (git-fixes).\n- media: budget-core: Improve exception handling in budget_register() (git-fixes).\n- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).\n- media: firewire: Using uninitialized values in node_probe() (git-fixes).\n- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).\n- media: vpss: clean up resources in init (git-fixes).\n- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).\n- mfd: dln2: Run event handler loop under spinlock (git-fixes).\n- mfd: rk808: Fix RK818 ID template (bsc#1175412).\n- mld: fix memory leak in ipv6_mc_destroy_dev() (networking-stable-20_06_28).\n- mm: filemap: clear idle flag for writes (bsc#1175769).\n- mm/migrate.c: add missing flush_dcache_page for non-mapped page migrate (git fixes (mm/migrate)).\n- mm/mmu_notifier: use hlist_add_head_rcu() (git fixes (mm/mmu_notifiers)).\n- mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() (git fixes (mm/compaction)).\n- mm/rmap.c: do not reuse anon_vma if we just want a copy (git fixes (mm/rmap)).\n- mm/shmem.c: cast the type of unmap_start to u64 (git fixes (mm/shmem)).\n- mm, thp: fix defrag setting if newline is not used (git fixes (mm/thp)).\n- mm/vunmap: add cond_resched() in vunmap_pmd_range (bsc#1175654 ltc#184617).\n- mtd: spi-nor: Fix an error code in spi_nor_read_raw() (bsc#1175413).\n- mtd: spi-nor: fix kernel-doc for spi_nor::info (bsc#1175414).\n- mtd: spi-nor: fix kernel-doc for spi_nor::reg_proto (bsc#1175415).\n- mtd: spi-nor: fix silent truncation in spi_nor_read_raw() (bsc#1175416).\n- mwifiex: Prevent memory corruption handling keys (git-fixes).\n- net: Added pointer check for dst-\u003eops-\u003eneigh_lookup in dst_neigh_lookup_skb (git-fixes).\n- net: bridge: enfore alignment for ethernet address (networking-stable-20_06_28).\n- net: core: reduce recursion limit value (networking-stable-20_06_28).\n- net: Do not clear the sock TX queue in sk_set_socket() (networking-stable-20_06_28).\n- net: dsa: b53: check for timeout (git-fixes).\n- net: ena: Add first_interrupt field to napi struct (bsc#1174852).\n- net: ena: add reserved PCI device ID (bsc#1174852).\n- net: ena: add support for reporting of packet drops (bsc#1174852).\n- net: ena: add support for the rx offset feature (bsc#1174852).\n- net: ena: add support for traffic mirroring (bsc#1174852).\n- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).\n- net: ena: allow setting the hash function without changing the key (bsc#1174852).\n- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).\n- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).\n- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).\n- net: ena: change num_queues to num_io_queues for clarity and consistency (bsc#1174852).\n- net: ena: changes to RSS hash key allocation (bsc#1174852).\n- net: ena: Change WARN_ON expression in ena_del_napi_in_range() (bsc#1174852).\n- net: ena: clean up indentation issue (bsc#1174852).\n- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).\n- net: ena: cosmetic: code reorderings (bsc#1174852).\n- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).\n- net: ena: cosmetic: fix line break issues (bsc#1174852).\n- net: ena: cosmetic: fix spacing issues (bsc#1174852).\n- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).\n- net: ena: cosmetic: minor code changes (bsc#1174852).\n- net: ena: cosmetic: remove unnecessary code (bsc#1174852).\n- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).\n- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).\n- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).\n- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).\n- net: ena: drop superfluous prototype (bsc#1174852).\n- net: ena: enable support of rss hash key and function changes (bsc#1174852).\n- net: ena: enable the interrupt_moderation in driver_supported_features (bsc#1174852).\n- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).\n- net: ena: ethtool: get_channels: use combined only (bsc#1174852).\n- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).\n- net: ena: ethtool: support set_channels callback (bsc#1174852).\n- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).\n- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).\n- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).\n- net: ena: fix incorrect setting of the number of msix vectors (bsc#1174852).\n- net: ena: fix incorrect update of intr_delay_resolution (bsc#1174852).\n- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).\n- net: ena: fix update of interrupt moderation register (bsc#1174852).\n- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).\n- net: ena: implement XDP drop support (bsc#1174852).\n- net: ena: Implement XDP_TX action (bsc#1174852).\n- net: ena: make ethtool -l show correct max number of queues (bsc#1174852).\n- net: ena: Make missed_tx stat incremental (bsc#1083548).\n- net: ena: Make some functions static (bsc#1174852).\n- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).\n- net: ena: multiple queue creation related cleanups (bsc#1174852).\n- net: ena: Prevent reset after device destruction (bsc#1083548).\n- net: ena: reduce driver load time (bsc#1174852).\n- net: ena: remove all old adaptive rx interrupt moderation code from ena_com (bsc#1174852).\n- net: ena: remove code duplication in ena_com_update_nonadaptive_moderation_interval _*() (bsc#1174852).\n- net: ena: remove code that does nothing (bsc#1174852).\n- net: ena: remove ena_restore_ethtool_params() and relevant fields (bsc#1174852).\n- net: ena: remove old adaptive interrupt moderation code from ena_netdev (bsc#1174852).\n- net: ena: remove redundant print of number of queues (bsc#1174852).\n- net: ena: remove set but not used variable \u0027hash_key\u0027 (bsc#1174852).\n- net: ena: remove set but not used variable \u0027rx_ring\u0027 (bsc#1174852).\n- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).\n- net: ena: Select DIMLIB for ENA_ETHERNET (bsc#1174852).\n- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).\n- net: ena: support new LLQ acceleration mode (bsc#1174852).\n- net: ena: switch to dim algorithm for rx adaptive interrupt moderation (bsc#1174852).\n- net: ena: use explicit variable size for clarity (bsc#1174852).\n- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).\n- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1174852).\n- net: ena: xdp: XDP_TX: fix memory leak (bsc#1174852).\n- net: ethernet: aquantia: Fix wrong return value (git-fixes).\n- net: ethernet: broadcom: have drivers select DIMLIB as needed (bsc#1174852).\n- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).\n- net: fec: correct the error path for regulator disable in probe (git-fixes).\n- netfilter: x_tables: add counters allocation wrapper (git-fixes).\n- netfilter: x_tables: cap allocations at 512 mbyte (git-fixes).\n- netfilter: x_tables: limit allocation requests for blob rule heads (git-fixes).\n- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)\n- net: fix memleak in register_netdevice() (networking-stable-20_06_28).\n- net: Fix the arp error in some cases (networking-stable-20_06_28).\n- net: gre: recompute gre csum for sctp over gre tunnels (git-fixes).\n- net: hns3: add autoneg and change speed support for fibre port (bsc#1174070).\n- net: hns3: add support for FEC encoding control (bsc#1174070).\n- net: hns3: add support for multiple media type (bsc#1174070).\n- net: hns3: fix a not link up issue when fibre port supports autoneg (bsc#1174070).\n- net: hns3: fix for FEC configuration (bsc#1174070).\n- net: hns3: fix port capbility updating issue (bsc#1174070).\n- net: hns3: fix port setting handle for fibre port (bsc#1174070).\n- net: hns3: fix selftest fail issue for fibre port with autoneg on (bsc#1174070).\n- net: hns3: restore the MAC autoneg state after reset (bsc#1174070).\n- net: increment xmit_recursion level in dev_direct_xmit() (networking-stable-20_06_28).\n- net: ip6_gre: Request headroom in __gre6_xmit() (git-fixes).\n- net: lan78xx: add missing endpoint sanity check (git-fixes).\n- net: lan78xx: fix transfer-buffer memory leak (git-fixes).\n- net: make symbol \u0027flush_works\u0027 static (git-fixes).\n- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).\n- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).\n- net: netsec: Fix signedness bug in netsec_probe() (bsc#1175417).\n- net: netsec: initialize tx ring on ndo_open (bsc#1175418).\n- net: phy: Check harder for errors in get_phy_id() (bsc#1111666).\n- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).\n- net: Set fput_needed iff FDPUT_FPUT is set (git-fixes).\n- net: socionext: Fix a signedness bug in ave_probe() (bsc#1175419).\n- net: socionext: replace napi_alloc_frag with the netdev variant on init (bsc#1175420).\n- net: spider_net: Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- net: stmmac: dwmac1000: provide multicast filter fallback (git-fixes).\n- net: stmmac: Fix RX packet size \u003e 8191 (git-fixes).\n- net: udp: Fix wrong clean up for IS_UDPLITE macro (git-fixes).\n- net: update net_dim documentation after rename (bsc#1174852).\n- net: usb: ax88179_178a: fix packet alignment padding (networking-stable-20_06_28).\n- net: usb: qmi_wwan: add support for Quectel EG95 LTE modem (networking-stable-20_07_17).\n- netvsc: unshare skb in VF rx handler (git-fixes).\n- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).\n- ntb: Fix an error in get link status (git-fixes).\n- ntb_netdev: fix sleep time mismatch (git-fixes).\n- ntb: ntb_transport: Use scnprintf() for avoiding potential buffer overflow (git-fixes).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme-multipath: do not fall back to __nvme_find_path() for non-optimized paths (bsc#1172108).\n- nvme-multipath: fix logic for non-optimized paths (bsc#1172108).\n- nvme-multipath: round-robin: eliminate \u0027fallback\u0027 variable (bsc#1172108).\n- nvme: multipath: round-robin: fix single non-optimized path case (bsc#1172108).\n- obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).\n- ocfs2: add trimfs dlm lock resource (bsc#1175228).\n- ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).\n- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n- ocfs2: change slot number type s16 to u16 (bsc#1175786).\n- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n- ocfs2: fix remounting needed after setfacl command (bsc#1173954).\n- ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).\n- ocfs2: fix value of OCFS2_INVALID_SLOT (bsc#1175767).\n- ocfs2: load global_inode_alloc (bsc#1172963).\n- ocfs2: load global_inode_alloc (bsc#1172963).\n- omapfb: dss: Fix max fclk divider for omap36xx (bsc#1113956)\n- openvswitch: Prevent kernel-infoleak in ovs_ct_put_key() (git-fixes).\n- PCI/ASPM: Add missing newline in sysfs \u0027policy\u0027 (git-fixes).\n- PCI: dwc: Move interrupt acking into the proper callback (bsc#1175666).\n- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).\n- PCI: Fix \u0027try\u0027 semantics of bus and slot reset (git-fixes).\n- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).\n- PCI: hv: Fix a timing issue which causes kdump to fail occasionally (bsc#1172871, bsc#1172872, git-fixes).\n- PCI: Release IVRS table in AMD ACS quirk (git-fixes).\n- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).\n- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).\n- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).\n- pinctrl: single: fix function name in documentation (git-fixes).\n- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).\n- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).\n- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).\n- PM / CPU: replace raw_notifier with atomic_notifier (git fixes (kernel/pm)).\n- PM / devfreq: rk3399_dmc: Add missing of_node_put() (bsc#1175668).\n- PM / devfreq: rk3399_dmc: Disable devfreq-event device when fails.\n- PM / devfreq: rk3399_dmc: Fix kernel oops when rockchip,pmu is absent (bsc#1175668).\n- PM: sleep: core: Fix the handling of pending runtime resume requests (git-fixes).\n- powerpc/64s: Do not init FSCR_DSCR in __init_FSCR() (bsc#1065729).\n- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).\n- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).\n- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).\n- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).\n- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).\n- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).\n- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).\n- powerpc/perf: Fix missing is_sier_aviable() during build (bsc#1065729).\n- powerpc/pseries: Do not initiate shutdown when system is running on UPS (bsc#1175440 ltc#187574).\n- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).\n- powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU death (bsc#1085030 ltC#165630).\n- powerpc/pseries: PCIE PHB reset (bsc#1174689).\n- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).\n- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).\n- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).\n- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).\n- propagate_one(): mnt_set_mountpoint() needs mount_lock (bsc#1174841).\n- pseries: Fix 64 bit logical memory block panic (bsc#1065729).\n- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).\n- rds: Prevent kernel-infoleak in rds_notify_queue_get() (git-fixes).\n- regulator: gpio: Honor regulator-boot-on property (git-fixes).\n- Revert \u0027ALSA: hda: call runtime_allow() for all hda controllers\u0027 (bsc#1111666).\n- Revert \u0027drm/amdgpu: Fix NULL dereference in dpm sysfs handlers\u0027 (bsc#1113956) \t* refresh for context changes\n- Revert \u0027ocfs2: avoid inode removal while nfsd is accessing it\u0027 This reverts commit 9e096c72476eda333a9998ff464580c00ff59c83.\n- Revert \u0027ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\u0027 This reverts commit 0bf6e248f93736b3f17f399b4a8f64ffa30d371e.\n- Revert \u0027ocfs2: load global_inode_alloc (bsc#1172963).\u0027 This reverts commit fc476497b53f967dc615b9cbad9427ba3107b5c4.\n- Revert pciehp patches that broke booting (bsc#1174887) \n- Revert \u0027scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe\u0027 (bsc#1171688 bsc#1174003).\n- Revert \u0027scsi: qla2xxx: Fix crash on qla2x00_mailbox_command\u0027 (bsc#1171688 bsc#1174003).\n- Revert \u0027sign also s390x kernel images (bsc#1163524)\u0027 This reverts commit b38b61155f0a2c3ebca06d4bb0c2e11a19a87f1f.\n- Revert \u0027xen/balloon: Fix crash when ballooning on x86 32 bit PAE\u0027 (bsc#1065600).\n- rocker: fix incorrect error handling in dma_rings_init (networking-stable-20_06_28).\n- rpm/check-for-config-changes: Ignore CONFIG_CC_VERSION_TEXT\n- rpm/check-for-config-changes: Ignore CONFIG_LD_VERSION\n- rpm/constraints.in: Increase memory for kernel-docs References: https://build.opensuse.org/request/show/792664\n- rpm: drop execute permissions on source files Sometimes a source file with execute permission appears in upstream repository and makes it into our kernel-source packages. This is caught by OBS build checks and may even result in build failures. Sanitize the source tree by removing execute permissions from all C source and header files.\n- rpm/kabi.pl: account for namespace field being moved last Upstream is moving the namespace field in Module.symvers last in order to preserve backwards compatibility with kmod tools (depmod, etc). Fix the kabi.pl script to expect the namespace field last. Since split() ignores trailing empty fields and delimeters, switch to using tr to count how many fields/tabs are in a line. Also, in load_symvers(), pass LIMIT of -1 to split() so it does not strip trailing empty fields, as namespace is an optional field.\n- rpm/kernel-binary.spec.in: do not run klp-symbols for configs with no modules Starting with 5.8-rc1, s390x/zfcpdump builds fail because rpm/klp-symbols script does not find .tmp_versions directory. This is missing because s390x/zfcpdump is built without modules (CONFIG_MODULES disabled). As livepatching cannot work without modules, the cleanest solution is setting %klp_symbols to 0 if CONFIG_MODULES is disabled. (We cannot simply add another condition to the place where %klp_symbols is set as it can be already set to 1 from prjconf.)\n- rpm/kernel-binary.spec.in: restrict livepatch metapackage to default flavor It has been reported that the kernel-*-livepatch metapackage got erroneously enabled for SLE15-SP3\u0027s new -preempt flavor, leading to a unresolvable dependency to a non-existing kernel-livepatch-x.y.z-preempt package. As SLE12 and SLE12-SP1 have run out of livepatching support, the need to build said metapackage for the -xen flavor is gone and the only remaining flavor for which they\u0027re still wanted is -default. Restrict the build of the kernel-*-livepatch metapackage to the -default flavor.\n- rpm/kernel-obs-build.spec.in: add dm-crypt for building with cryptsetup Co-Authored-By: Adam Spiers \u003caspiers@suse.com\u003e\n- rpm/kernel-obs-build.spec.in: Enable overlayfs Overlayfs is needed for podman or docker builds when no more specific driver can be used (like lvm or btrfs). As the default build fs is ext4 currently, we need overlayfs kernel modules to be available.\n- rpm/kernel-source.spec.in: Add obsolete_rebuilds (boo#1172073).\n- rpm/mkspec-dtb: add mt76 based dtb package\n- rpm/package-descriptions: garbege collection remove old ARM and Xen flavors.\n- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).\n- s390, dcssblk: kaddr and pfn can be NULL to -\u003edirect_access() (bsc#1174873).\n- sched: consistently handle layer3 header accesses in the presence of VLANs (networking-stable-20_07_17).\n- scsi: dh: Add Fujitsu device to devinfo and dh lists (bsc#1174026).\n- scsi: Fix trivial spelling (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Address a set of sparse warnings (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1171688 bsc#1174003). \n- scsi: qla2xxx: Change {RD,WRT}_REG_*() function names from upper case into lower case (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix endianness annotations in header files (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix endianness annotations in source files (bsc#1171688 bsc#1174003). \n- scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix issue with adapter\u0027s stopping state (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix login timeout (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix null pointer access during disconnect from subsystem (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix spelling of a variable name (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix warning after FC target reset (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Flush all sessions on zone disable (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Flush I/O on zone disable (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Initialize \u0027n\u0027 before using it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Reduce noisy debug message (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove an unused function (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove a superfluous cast (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: SAN congestion management implementation (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use register names instead of register offsets (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use true, false for ha-\u003efw_dumped (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1171688 bsc#1174003).\n- scsi: smartpqi: add bay identifier (bsc#1172418).\n- scsi: smartpqi: add gigabyte controller (bsc#1172418).\n- scsi: smartpqi: add id support for SmartRAID 3152-8i (bsc#1172418).\n- scsi: smartpqi: add inquiry timeouts (bsc#1172418).\n- scsi: smartpqi: add module param for exposure order (bsc#1172418).\n- scsi: smartpqi: add module param to hide vsep (bsc#1172418).\n- scsi: smartpqi: add new pci ids (bsc#1172418).\n- scsi: smartpqi: add pci ids for fiberhome controller (bsc#1172418).\n- scsi: smartpqi: add RAID bypass counter (bsc#1172418).\n- scsi: smartpqi: add sysfs entries (bsc#1172418).\n- scsi: smartpqi: Align driver syntax with oob (bsc#1172418).\n- scsi: smartpqi: avoid crashing kernel for controller issues (bsc#1172418).\n- scsi: smartpqi: bump version (bsc#1172418).\n- scsi: smartpqi: bump version (bsc#1172418).\n- scsi: smartpqi: bump version to 1.2.16-010 (bsc#1172418).\n- scsi: smartpqi: change TMF timeout from 60 to 30 seconds (bsc#1172418).\n- scsi: smartpqi: correct hang when deleting 32 lds (bsc#1172418).\n- scsi: smartpqi: correct REGNEWD return status (bsc#1172418).\n- scsi: smartpqi: correct syntax issue (bsc#1172418).\n- scsi: smartpqi: fix call trace in device discovery (bsc#1172418).\n- scsi: smartpqi: fix controller lockup observed during force reboot (bsc#1172418).\n- scsi: smartpqi: fix LUN reset when fw bkgnd thread is hung (bsc#1172418).\n- scsi: smartpqi: fix problem with unique ID for physical device (bsc#1172418).\n- scsi: smartpqi: identify physical devices without issuing INQUIRY (bsc#1172418).\n- scsi: smartpqi: properly set both the DMA mask and the coherent DMA mask (bsc#1172418).\n- scsi: smartpqi: remove unused manifest constants (bsc#1172418).\n- scsi: smartpqi: Reporting unhandled SCSI errors (bsc#1172418).\n- scsi: smartpqi: support device deletion via sysfs (bsc#1172418).\n- scsi: smartpqi: update copyright (bsc#1172418).\n- scsi: smartpqi: update logical volume size after expansion (bsc#1172418).\n- scsi: smartpqi: Use scnprintf() for avoiding potential buffer overflow (bsc#1172418).\n- scsi: storvsc: Correctly set number of hardware queues for IDE disk (git-fixes).\n- scsi: target/iblock: fix WRITE SAME zeroing (bsc#1169790).\n- sctp: Do not advertise IPv4 addresses if ipv6only is set on the socket (networking-stable-20_06_28).\n- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).\n- serial: 8250: change lock order in serial8250_do_startup() (git-fixes).\n- serial: pl011: Do not leak amba_ports entry on driver register error (git-fixes).\n- serial: pl011: Fix oops on -EPROBE_DEFER (git-fixes).\n- Set VIRTIO_CONSOLE=y (bsc#1175667).\n- sign also s390x kernel images (bsc#1163524)\n- soc: fsl: qbman: allow registering a device link for the portal user (bsc#1174550).\n- soc: fsl: qbman_portals: add APIs to retrieve the probing status (bsc#1174550).\n- spi: davinci: Remove uninitialized_var() usage (git-fixes).\n- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).\n- spi: nxp-fspi: Ensure width is respected in spi-mem operations (bsc#1175421).\n- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1175422).\n- spi: spi-mem: export spi_mem_default_supports_op() (bsc#1175421).\n- staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).\n- staging: fsl-dpaa2: ethsw: Add missing netdevice check (bsc#1175423).\n- staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).\n- staging/speakup: fix get_word non-space look-ahead (git-fixes).\n- tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT (networking-stable-20_06_28).\n- tcp: grow window for OOO packets only for SACK flows (networking-stable-20_06_28).\n- tcp: make sure listeners do not initialize congestion-control state (networking-stable-20_07_17).\n- tcp: md5: add missing memory barriers in tcp_md5_do_add()/tcp_md5_hash_key() (networking-stable-20_07_17).\n- tcp: md5: do not send silly options in SYNCOOKIES (networking-stable-20_07_17).\n- tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key() barriers (networking-stable-20_07_17).\n- tracepoint: Mark __tracepoint_string\u0027s __used (git-fixes).\n- tracing: Use trace_sched_process_free() instead of exit() for pid tracing (git-fixes).\n- tty: serial: fsl_lpuart: add imx8qxp support (bsc#1175670).\n- tty: serial: fsl_lpuart: free IDs allocated by IDA (bsc#1175670).\n- Update patch reference for a tipc fix patch (bsc#1175515)\n- USB: cdc-acm: rework notification_buffer resizing (git-fixes).\n- USB: gadget: f_tcm: Fix some resource leaks in some error paths (git-fixes).\n- USB: host: ohci-exynos: Fix error handling in exynos_ohci_probe() (git-fixes).\n- USB: Ignore UAS for JMicron JMS567 ATA/ATAPI Bridge (git-fixes).\n- USB: iowarrior: fix up report size handling for some devices (git-fixes).\n- USBip: tools: fix module name in man page (git-fixes).\n- USB: rename USB quirk to USB_QUIRK_ENDPOINT_IGNORE (git-fixes).\n- USB: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).\n- USB: serial: cp210x: re-enable auto-RTS on open (git-fixes).\n- USB: serial: ftdi_sio: clean up receive processing (git-fixes).\n- USB: serial: ftdi_sio: fix break and sysrq handling (git-fixes).\n- USB: serial: ftdi_sio: make process-packet buffer unsigned (git-fixes).\n- USB: serial: iuu_phoenix: fix led-activity helpers (git-fixes).\n- USB: serial: qcserial: add EM7305 QDL product ID (git-fixes).\n- USB: xhci: define IDs for various ASMedia host controllers (git-fixes).\n- USB: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).\n- USB: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).\n- USB: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).\n- VFS: Check rename_lock in lookup_fast() (bsc#1174734).\n- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).\n- video: pxafb: Fix the function used to balance a \u0027dma_alloc_coherent()\u0027 call (git-fixes).\n- vlan: consolidate VLAN parsing code and limit max parsing depth (networking-stable-20_07_17).\n- vmxnet3: use correct tcp hdr length when packet is encapsulated (bsc#1175199).\n- vt_compat_ioctl(): clean up, use compat_ptr() properly (git-fixes).\n- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).\n- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (bsc#1111666).\n- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (bsc#1111666).\n- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (bsc#1111666).\n- wl1251: fix always return 0 error (git-fixes).\n- x86/hyperv: Create and use Hyper-V page definitions (git-fixes).\n- x86/hyper-v: Fix overflow bug in fill_gva_list() (git-fixes).\n- x86/hyperv: Make hv_vcpu_is_preempted() visible (git-fixes).\n- xen/balloon: fix accounting in alloc_xenballooned_pages error path (bsc#1065600).\n- xen/balloon: make the balloon wait interruptible (bsc#1065600).\n- xfrm: check id proto in validate_tmpl() (git-fixes).\n- xfrm: clean up xfrm protocol checks (git-fixes).\n- xfrm_user: uncoditionally validate esn replay attribute struct (git-fixes).\n- xfs: fix inode allocation block res calculation precedence (git-fixes).\n- xfs: fix reflink quota reservation accounting error (git-fixes).\n- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2540,SUSE-SLE-SERVER-12-SP5-2020-2540", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2540-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2540-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202540-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2540-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1074701", "url": "https://bugzilla.suse.com/1074701" }, { "category": "self", "summary": "SUSE Bug 1083548", "url": "https://bugzilla.suse.com/1083548" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1085235", "url": "https://bugzilla.suse.com/1085235" }, { "category": "self", "summary": "SUSE Bug 1085308", "url": "https://bugzilla.suse.com/1085308" }, { "category": "self", "summary": "SUSE Bug 1087078", "url": "https://bugzilla.suse.com/1087078" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1094912", "url": "https://bugzilla.suse.com/1094912" }, { "category": "self", "summary": "SUSE Bug 1100394", "url": "https://bugzilla.suse.com/1100394" }, { "category": "self", "summary": "SUSE Bug 1102640", "url": "https://bugzilla.suse.com/1102640" }, { "category": "self", "summary": "SUSE Bug 1105412", "url": "https://bugzilla.suse.com/1105412" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1120163", "url": "https://bugzilla.suse.com/1120163" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1152148", "url": "https://bugzilla.suse.com/1152148" }, { "category": "self", "summary": "SUSE Bug 1163524", "url": "https://bugzilla.suse.com/1163524" }, { "category": "self", "summary": "SUSE Bug 1165629", "url": "https://bugzilla.suse.com/1165629" }, { "category": "self", "summary": "SUSE Bug 1166965", "url": "https://bugzilla.suse.com/1166965" }, { "category": "self", "summary": "SUSE Bug 1169790", "url": "https://bugzilla.suse.com/1169790" }, { "category": "self", "summary": "SUSE Bug 1170232", "url": "https://bugzilla.suse.com/1170232" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1172073", "url": "https://bugzilla.suse.com/1172073" }, { "category": "self", "summary": "SUSE Bug 1172108", "url": "https://bugzilla.suse.com/1172108" }, { "category": "self", "summary": "SUSE Bug 1172247", "url": "https://bugzilla.suse.com/1172247" }, { "category": "self", "summary": "SUSE Bug 1172418", "url": "https://bugzilla.suse.com/1172418" }, { "category": "self", "summary": "SUSE Bug 1172428", "url": "https://bugzilla.suse.com/1172428" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172871", "url": "https://bugzilla.suse.com/1172871" }, { "category": "self", "summary": "SUSE Bug 1172872", "url": "https://bugzilla.suse.com/1172872" }, { "category": "self", "summary": "SUSE Bug 1172873", "url": "https://bugzilla.suse.com/1172873" }, { "category": "self", "summary": "SUSE Bug 1172963", "url": "https://bugzilla.suse.com/1172963" }, { "category": "self", "summary": "SUSE Bug 1173485", "url": "https://bugzilla.suse.com/1173485" }, { "category": "self", "summary": "SUSE Bug 1173798", "url": "https://bugzilla.suse.com/1173798" }, { "category": "self", "summary": "SUSE Bug 1173954", "url": "https://bugzilla.suse.com/1173954" }, { "category": "self", "summary": "SUSE Bug 1174003", "url": "https://bugzilla.suse.com/1174003" }, { "category": "self", "summary": "SUSE Bug 1174026", "url": "https://bugzilla.suse.com/1174026" }, { "category": "self", "summary": "SUSE Bug 1174070", "url": "https://bugzilla.suse.com/1174070" }, { "category": "self", "summary": "SUSE Bug 1174161", "url": "https://bugzilla.suse.com/1174161" }, { "category": "self", "summary": "SUSE Bug 1174205", "url": "https://bugzilla.suse.com/1174205" }, { "category": "self", "summary": "SUSE Bug 1174247", "url": "https://bugzilla.suse.com/1174247" }, { "category": "self", "summary": "SUSE Bug 1174387", "url": "https://bugzilla.suse.com/1174387" }, { "category": "self", "summary": "SUSE Bug 1174484", "url": "https://bugzilla.suse.com/1174484" }, { "category": "self", "summary": "SUSE Bug 1174547", "url": "https://bugzilla.suse.com/1174547" }, { "category": "self", "summary": "SUSE Bug 1174550", "url": "https://bugzilla.suse.com/1174550" }, { "category": "self", "summary": "SUSE Bug 1174625", "url": "https://bugzilla.suse.com/1174625" }, { "category": "self", "summary": "SUSE Bug 1174658", "url": "https://bugzilla.suse.com/1174658" }, { "category": "self", "summary": "SUSE Bug 1174685", "url": "https://bugzilla.suse.com/1174685" }, { "category": "self", "summary": "SUSE Bug 1174689", "url": "https://bugzilla.suse.com/1174689" }, { "category": "self", "summary": "SUSE Bug 1174699", "url": "https://bugzilla.suse.com/1174699" }, { "category": "self", "summary": "SUSE Bug 1174734", "url": "https://bugzilla.suse.com/1174734" }, { "category": "self", "summary": "SUSE Bug 1174757", "url": "https://bugzilla.suse.com/1174757" }, { "category": "self", "summary": "SUSE Bug 1174771", "url": "https://bugzilla.suse.com/1174771" }, { "category": "self", "summary": "SUSE Bug 1174840", "url": "https://bugzilla.suse.com/1174840" }, { "category": "self", "summary": "SUSE Bug 1174841", "url": "https://bugzilla.suse.com/1174841" }, { "category": "self", "summary": "SUSE Bug 1174843", "url": "https://bugzilla.suse.com/1174843" }, { "category": "self", "summary": "SUSE Bug 1174844", "url": "https://bugzilla.suse.com/1174844" }, { "category": "self", "summary": "SUSE Bug 1174845", "url": "https://bugzilla.suse.com/1174845" }, { "category": "self", "summary": "SUSE Bug 1174852", "url": "https://bugzilla.suse.com/1174852" }, { "category": "self", "summary": "SUSE Bug 1174873", "url": "https://bugzilla.suse.com/1174873" }, { "category": "self", "summary": "SUSE Bug 1174887", "url": "https://bugzilla.suse.com/1174887" }, { "category": "self", "summary": "SUSE Bug 1174904", "url": "https://bugzilla.suse.com/1174904" }, { "category": "self", "summary": "SUSE Bug 1174926", "url": "https://bugzilla.suse.com/1174926" }, { "category": "self", "summary": "SUSE Bug 1174968", "url": "https://bugzilla.suse.com/1174968" }, { "category": "self", "summary": "SUSE Bug 1175062", "url": "https://bugzilla.suse.com/1175062" }, { "category": "self", "summary": "SUSE Bug 1175063", "url": "https://bugzilla.suse.com/1175063" }, { "category": "self", "summary": "SUSE Bug 1175064", "url": "https://bugzilla.suse.com/1175064" }, { "category": "self", "summary": "SUSE Bug 1175065", "url": "https://bugzilla.suse.com/1175065" }, { "category": "self", "summary": "SUSE Bug 1175066", "url": "https://bugzilla.suse.com/1175066" }, { "category": "self", "summary": "SUSE Bug 1175067", "url": "https://bugzilla.suse.com/1175067" }, { "category": "self", "summary": "SUSE Bug 1175112", "url": "https://bugzilla.suse.com/1175112" }, { "category": "self", "summary": "SUSE Bug 1175127", "url": "https://bugzilla.suse.com/1175127" }, { "category": "self", "summary": "SUSE Bug 1175128", "url": "https://bugzilla.suse.com/1175128" }, { "category": "self", "summary": "SUSE Bug 1175149", "url": "https://bugzilla.suse.com/1175149" }, { "category": "self", "summary": "SUSE Bug 1175199", "url": "https://bugzilla.suse.com/1175199" }, { "category": "self", "summary": "SUSE Bug 1175213", "url": "https://bugzilla.suse.com/1175213" }, { "category": "self", "summary": "SUSE Bug 1175228", "url": "https://bugzilla.suse.com/1175228" }, { "category": "self", "summary": "SUSE Bug 1175232", "url": "https://bugzilla.suse.com/1175232" }, { "category": "self", "summary": "SUSE Bug 1175284", "url": "https://bugzilla.suse.com/1175284" }, { "category": "self", "summary": "SUSE Bug 1175393", "url": "https://bugzilla.suse.com/1175393" }, { "category": "self", "summary": "SUSE Bug 1175394", "url": "https://bugzilla.suse.com/1175394" }, { "category": "self", "summary": "SUSE Bug 1175396", "url": "https://bugzilla.suse.com/1175396" }, { "category": "self", "summary": "SUSE Bug 1175397", "url": "https://bugzilla.suse.com/1175397" }, { "category": "self", "summary": "SUSE Bug 1175398", "url": "https://bugzilla.suse.com/1175398" }, { "category": "self", "summary": "SUSE Bug 1175399", "url": "https://bugzilla.suse.com/1175399" }, { "category": "self", "summary": "SUSE Bug 1175400", "url": "https://bugzilla.suse.com/1175400" }, { "category": "self", "summary": "SUSE Bug 1175401", "url": "https://bugzilla.suse.com/1175401" }, { "category": "self", "summary": "SUSE Bug 1175402", "url": "https://bugzilla.suse.com/1175402" }, { "category": "self", "summary": "SUSE Bug 1175403", "url": "https://bugzilla.suse.com/1175403" }, { "category": "self", "summary": "SUSE Bug 1175404", "url": "https://bugzilla.suse.com/1175404" }, { "category": "self", "summary": "SUSE Bug 1175405", "url": "https://bugzilla.suse.com/1175405" }, { "category": "self", "summary": "SUSE Bug 1175406", "url": "https://bugzilla.suse.com/1175406" }, { "category": "self", "summary": "SUSE Bug 1175407", "url": "https://bugzilla.suse.com/1175407" }, { "category": "self", "summary": "SUSE Bug 1175408", "url": "https://bugzilla.suse.com/1175408" }, { "category": "self", "summary": "SUSE Bug 1175409", "url": "https://bugzilla.suse.com/1175409" }, { "category": "self", "summary": "SUSE Bug 1175410", "url": "https://bugzilla.suse.com/1175410" }, { "category": "self", "summary": "SUSE Bug 1175411", "url": "https://bugzilla.suse.com/1175411" }, { "category": "self", "summary": "SUSE Bug 1175412", "url": "https://bugzilla.suse.com/1175412" }, { "category": "self", "summary": "SUSE Bug 1175413", "url": "https://bugzilla.suse.com/1175413" }, { "category": "self", "summary": "SUSE Bug 1175414", "url": "https://bugzilla.suse.com/1175414" }, { "category": "self", "summary": "SUSE Bug 1175415", "url": "https://bugzilla.suse.com/1175415" }, { "category": "self", "summary": "SUSE Bug 1175416", "url": "https://bugzilla.suse.com/1175416" }, { "category": "self", "summary": "SUSE Bug 1175417", "url": "https://bugzilla.suse.com/1175417" }, { "category": "self", "summary": "SUSE Bug 1175418", "url": "https://bugzilla.suse.com/1175418" }, { "category": "self", "summary": "SUSE Bug 1175419", "url": "https://bugzilla.suse.com/1175419" }, { "category": "self", "summary": "SUSE Bug 1175420", "url": "https://bugzilla.suse.com/1175420" }, { "category": "self", "summary": "SUSE Bug 1175421", "url": "https://bugzilla.suse.com/1175421" }, { "category": "self", "summary": "SUSE Bug 1175422", "url": "https://bugzilla.suse.com/1175422" }, { "category": "self", "summary": "SUSE Bug 1175423", "url": "https://bugzilla.suse.com/1175423" }, { "category": "self", "summary": "SUSE Bug 1175440", "url": "https://bugzilla.suse.com/1175440" }, { "category": "self", "summary": "SUSE Bug 1175493", "url": "https://bugzilla.suse.com/1175493" }, { "category": "self", "summary": "SUSE Bug 1175515", "url": "https://bugzilla.suse.com/1175515" }, { "category": "self", "summary": "SUSE Bug 1175518", "url": "https://bugzilla.suse.com/1175518" }, { "category": "self", "summary": "SUSE Bug 1175526", "url": "https://bugzilla.suse.com/1175526" }, { "category": "self", "summary": "SUSE Bug 1175550", "url": "https://bugzilla.suse.com/1175550" }, { "category": "self", "summary": "SUSE Bug 1175654", "url": "https://bugzilla.suse.com/1175654" }, { "category": "self", "summary": "SUSE Bug 1175666", "url": "https://bugzilla.suse.com/1175666" }, { "category": "self", "summary": "SUSE Bug 1175667", "url": "https://bugzilla.suse.com/1175667" }, { "category": "self", "summary": "SUSE Bug 1175668", "url": "https://bugzilla.suse.com/1175668" }, { "category": "self", "summary": "SUSE Bug 1175669", "url": "https://bugzilla.suse.com/1175669" }, { "category": "self", "summary": "SUSE Bug 1175670", "url": "https://bugzilla.suse.com/1175670" }, { "category": "self", "summary": "SUSE Bug 1175767", "url": "https://bugzilla.suse.com/1175767" }, { "category": "self", "summary": "SUSE Bug 1175768", "url": "https://bugzilla.suse.com/1175768" }, { "category": "self", "summary": "SUSE Bug 1175769", "url": "https://bugzilla.suse.com/1175769" }, { "category": "self", "summary": "SUSE Bug 1175770", "url": "https://bugzilla.suse.com/1175770" }, { "category": "self", "summary": "SUSE Bug 1175771", "url": "https://bugzilla.suse.com/1175771" }, { "category": "self", "summary": "SUSE Bug 1175772", "url": "https://bugzilla.suse.com/1175772" }, { "category": "self", "summary": "SUSE Bug 1175786", "url": "https://bugzilla.suse.com/1175786" }, { "category": "self", "summary": "SUSE Bug 1175873", "url": "https://bugzilla.suse.com/1175873" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3639 page", "url": "https://www.suse.com/security/cve/CVE-2018-3639/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14314 page", "url": "https://www.suse.com/security/cve/CVE-2020-14314/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14356 page", "url": "https://www.suse.com/security/cve/CVE-2020-14356/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16166 page", "url": "https://www.suse.com/security/cve/CVE-2020-16166/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1749 page", "url": "https://www.suse.com/security/cve/CVE-2020-1749/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24394 page", "url": "https://www.suse.com/security/cve/CVE-2020-24394/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-09-04T15:36:05Z", "generator": { "date": "2020-09-04T15:36:05Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2540-1", "initial_release_date": "2020-09-04T15:36:05Z", "revision_history": [ { "date": "2020-09-04T15:36:05Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-16.25.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-16.25.1.noarch", "product_id": "kernel-devel-azure-4.12.14-16.25.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-16.25.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-16.25.1.noarch", "product_id": "kernel-source-azure-4.12.14-16.25.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-16.25.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-16.25.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-16.25.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-16.25.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-16.25.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-16.25.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-16.25.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-16.25.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-16.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-16.25.1.x86_64", "product": { "name": "kernel-azure-4.12.14-16.25.1.x86_64", "product_id": "kernel-azure-4.12.14-16.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-16.25.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-16.25.1.x86_64", "product_id": "kernel-azure-base-4.12.14-16.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-16.25.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-16.25.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-16.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-16.25.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-16.25.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-16.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-kgraft-devel-4.12.14-16.25.1.x86_64", "product": { "name": "kernel-azure-kgraft-devel-4.12.14-16.25.1.x86_64", "product_id": "kernel-azure-kgraft-devel-4.12.14-16.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-16.25.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-16.25.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-16.25.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-16.25.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-16.25.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-16.25.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-16.25.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-16.25.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-16.25.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-16.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-16.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-16.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-16.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-16.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-16.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-16.25.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-16.25.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-16.25.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-16.25.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-16.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-16.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-16.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-16.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-16.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-16.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-16.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-16.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-16.25.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-16.25.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-16.25.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-16.25.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-16.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-16.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-3639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3639" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3639", "url": "https://www.suse.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1085235 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085235" }, { "category": "external", "summary": "SUSE Bug 1085308 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085308" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092631 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092631" }, { "category": "external", "summary": "SUSE Bug 1092885 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092885" }, { "category": "external", "summary": "SUSE Bug 1094912 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1094912" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100394 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1100394" }, { "category": "external", "summary": "SUSE Bug 1102640 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1102640" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1105412" }, { "category": "external", "summary": "SUSE Bug 1111963 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1111963" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172781" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172782" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172783" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T15:36:05Z", "details": "moderate" } ], "title": "CVE-2018-3639" }, { "cve": "CVE-2020-14314", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14314" } ], "notes": [ { "category": "general", "text": "A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14314", "url": "https://www.suse.com/security/cve/CVE-2020-14314" }, { "category": "external", "summary": "SUSE Bug 1173798 for CVE-2020-14314", "url": "https://bugzilla.suse.com/1173798" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T15:36:05Z", "details": "moderate" } ], "title": "CVE-2020-14314" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T15:36:05Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14356" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14356", "url": "https://www.suse.com/security/cve/CVE-2020-14356" }, { "category": "external", "summary": "SUSE Bug 1175213 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1175213" }, { "category": "external", "summary": "SUSE Bug 1176392 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1176392" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T15:36:05Z", "details": "moderate" } ], "title": "CVE-2020-14356" }, { "cve": "CVE-2020-16166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16166" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16166", "url": "https://www.suse.com/security/cve/CVE-2020-16166" }, { "category": "external", "summary": "SUSE Bug 1174757 for CVE-2020-16166", "url": "https://bugzilla.suse.com/1174757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T15:36:05Z", "details": "moderate" } ], "title": "CVE-2020-16166" }, { "cve": "CVE-2020-1749", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1749" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1749", "url": "https://www.suse.com/security/cve/CVE-2020-1749" }, { "category": "external", "summary": "SUSE Bug 1165629 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165629" }, { "category": "external", "summary": "SUSE Bug 1165631 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165631" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177513" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1189302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T15:36:05Z", "details": "important" } ], "title": "CVE-2020-1749" }, { "cve": "CVE-2020-24394", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24394" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24394", "url": "https://www.suse.com/security/cve/CVE-2020-24394" }, { "category": "external", "summary": "SUSE Bug 1175518 for CVE-2020-24394", "url": "https://bugzilla.suse.com/1175518" }, { "category": "external", "summary": "SUSE Bug 1175992 for CVE-2020-24394", "url": "https://bugzilla.suse.com/1175992" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T15:36:05Z", "details": "important" } ], "title": "CVE-2020-24394" } ] }
suse-su-2020:2506-1
Vulnerability from csaf_suse
Published
2020-09-04 11:31
Modified
2020-09-04 11:31
Summary
Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP5)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP5)
Description of the patch
This update for the Linux Kernel 4.12.14-122_7 fixes several issues.
The following security issues were fixed:
- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2020-15780: Fixed a lockdown bypass via injection of malicious ACPI tables via configfs (bsc#1174186).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2019-19447: Fixed a use-after-free in ext4_put_super (bsc#1173869).
- CVE-2019-14901: Fixed a heap overflow in the Marvell WiFi driver (bsc#1173661).
- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173100).
Patchnames
SUSE-2020-2506,SUSE-SLE-Live-Patching-12-SP4-2020-2506,SUSE-SLE-Live-Patching-12-SP5-2020-2512
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP5)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-122_7 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).\n- CVE-2020-15780: Fixed a lockdown bypass via injection of malicious ACPI tables via configfs (bsc#1174186).\n- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).\n- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).\n- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).\n- CVE-2019-19447: Fixed a use-after-free in ext4_put_super (bsc#1173869).\n- CVE-2019-14901: Fixed a heap overflow in the Marvell WiFi driver (bsc#1173661).\n- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173100).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2506,SUSE-SLE-Live-Patching-12-SP4-2020-2506,SUSE-SLE-Live-Patching-12-SP5-2020-2512", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2506-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2506-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202506-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2506-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" }, { "category": "self", "summary": "SUSE Bug 1173100", "url": "https://bugzilla.suse.com/1173100" }, { "category": "self", "summary": "SUSE Bug 1173659", "url": "https://bugzilla.suse.com/1173659" }, { "category": "self", "summary": "SUSE Bug 1173661", "url": "https://bugzilla.suse.com/1173661" }, { "category": "self", "summary": "SUSE Bug 1173869", "url": "https://bugzilla.suse.com/1173869" }, { "category": "self", "summary": "SUSE Bug 1173942", "url": "https://bugzilla.suse.com/1173942" }, { "category": "self", "summary": "SUSE Bug 1173963", "url": "https://bugzilla.suse.com/1173963" }, { "category": "self", "summary": "SUSE Bug 1174186", "url": "https://bugzilla.suse.com/1174186" }, { "category": "self", "summary": "SUSE Bug 1174247", "url": "https://bugzilla.suse.com/1174247" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14895 page", "url": "https://www.suse.com/security/cve/CVE-2019-14895/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14901 page", "url": "https://www.suse.com/security/cve/CVE-2019-14901/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19447 page", "url": "https://www.suse.com/security/cve/CVE-2019-19447/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9458 page", "url": "https://www.suse.com/security/cve/CVE-2019-9458/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11668 page", "url": "https://www.suse.com/security/cve/CVE-2020-11668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" } ], "title": "Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP5)", "tracking": { "current_release_date": "2020-09-04T11:31:45Z", "generator": { "date": "2020-09-04T11:31:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2506-1", "initial_release_date": "2020-09-04T11:31:45Z", "revision_history": [ { "date": "2020-09-04T11:31:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-14895", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14895" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14895", "url": "https://www.suse.com/security/cve/CVE-2019-14895" }, { "category": "external", "summary": "SUSE Bug 1157042 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1157042" }, { "category": "external", "summary": "SUSE Bug 1157158 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1157158" }, { "category": "external", "summary": "SUSE Bug 1173100 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1173100" }, { "category": "external", "summary": "SUSE Bug 1173660 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1173660" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:31:45Z", "details": "important" } ], "title": "CVE-2019-14895" }, { "cve": "CVE-2019-14901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14901" } ], "notes": [ { "category": "general", "text": "A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14901", "url": "https://www.suse.com/security/cve/CVE-2019-14901" }, { "category": "external", "summary": "SUSE Bug 1157042 for CVE-2019-14901", "url": "https://bugzilla.suse.com/1157042" }, { "category": "external", "summary": "SUSE Bug 1173661 for CVE-2019-14901", "url": "https://bugzilla.suse.com/1173661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:31:45Z", "details": "important" } ], "title": "CVE-2019-14901" }, { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:31:45Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2019-19447", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19447" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19447", "url": "https://www.suse.com/security/cve/CVE-2019-19447" }, { "category": "external", "summary": "SUSE Bug 1158819 for CVE-2019-19447", "url": "https://bugzilla.suse.com/1158819" }, { "category": "external", "summary": "SUSE Bug 1173869 for CVE-2019-19447", "url": "https://bugzilla.suse.com/1173869" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:31:45Z", "details": "important" } ], "title": "CVE-2019-19447" }, { "cve": "CVE-2019-9458", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9458" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9458", "url": "https://www.suse.com/security/cve/CVE-2019-9458" }, { "category": "external", "summary": "SUSE Bug 1168295 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1168295" }, { "category": "external", "summary": "SUSE Bug 1173963 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1173963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:31:45Z", "details": "important" } ], "title": "CVE-2019-9458" }, { "cve": "CVE-2020-11668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11668" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11668", "url": "https://www.suse.com/security/cve/CVE-2020-11668" }, { "category": "external", "summary": "SUSE Bug 1168952 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1168952" }, { "category": "external", "summary": "SUSE Bug 1173942 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1173942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:31:45Z", "details": "important" } ], "title": "CVE-2020-11668" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:31:45Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_45-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_7-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:31:45Z", "details": "important" } ], "title": "CVE-2020-15780" } ] }
suse-su-2020:2119-1
Vulnerability from csaf_suse
Published
2020-08-04 13:16
Modified
2020-08-04 13:16
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-15780: A lockdown bypass for loading unsigned modules using ACPI table injection was fixed. (bsc#1173573)
- CVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).
- CVE-2020-12771: An issue was discovered in btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).
- CVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).
- CVE-2020-14416: Fixed a race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-0305: Fixed a possible use-after-free due to a race condition incdev_get of char_dev.c. This could lead to local escalation of privilege. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).
- CVE-2020-10781: Fixed a denial of service issue in the ZRAM implementation (bnc#1173074).
- CVE-2019-20908: Fixed incorrect access permissions for the efivar_ssdt ACPI variable, which could be used by attackers to bypass lockdown or secure boot restrictions (bnc#1173567).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c, related to invalid length checks for variable elements in a beacon head (bnc#1152107).
- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-14331: Fixed a buffer over write in vgacon_scrollback_update() (bnc#1174205).
The following non-security bugs were fixed:
- ACPI: GED: add support for _Exx / _Lxx handler methods (bsc#1111666).
- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (bsc#1111666).
- ACPI: NFIT: Fix unlock on error in scrub_show() (bsc#1171753).
- ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).
- ACPI: video: Use native backlight on Acer Aspire 5783z (bsc#1111666).
- ACPI: video: Use native backlight on Acer TravelMate 5735Z (bsc#1111666).
- ALSA: hda - let hs_mic be picked ahead of hp_mic (bsc#1111666).
- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (bsc#1111666).
- ALSA: lx6464es - add support for LX6464ESe pci express variant (bsc#1111666).
- ALSA: opl3: fix infoleak in opl3 (bsc#1111666).
- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (bsc#1111666).
- ALSA: usb-audio: Fix packet size calculation (bsc#1111666).
- ALSA: usb-audio: Improve frames size computation (bsc#1111666).
- amdgpu: a NULL ->mm does not mean a thread is a kthread (git-fixes).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (bsc#1111666).
- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (bsc#1111666).
- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (bsc#1111666).
- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (bsc#1111666).
- ax25: fix setsockopt(SO_BINDTODEVICE) (networking-stable-20_05_27).
- b43: Fix connection problem with WPA3 (bsc#1111666).
- b43_legacy: Fix connection problem with WPA3 (bsc#1111666).
- be2net: fix link failure after ethtool offline test (git-fixes).
- block, bfq: add requeue-request hook (bsc#1104967 bsc#1171673).
- block, bfq: postpone rq preparation to insert or merge (bsc#1104967 bsc#1171673).
- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).
- Bluetooth: Add SCO fallback for invalid LMP parameters error (bsc#1111666).
- bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).
- bnxt_en: Fix ethtool selftest crash under error conditions (git-fixes).
- bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE cmd fails (git-fixes).
- bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).
- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (git-fixes).
- bnxt_en: Fix VF anti-spoof filter setup (networking-stable-20_05_12).
- bnxt_en: Fix VLAN acceleration handling in bnxt_fix_features() (networking-stable-20_05_12).
- bnxt_en: Improve AER slot reset (networking-stable-20_05_12).
- brcmfmac: Transform compatible string for FW loading (bsc#1169771).
- btrfs: add assertions for tree == inode->io_tree to extent IO helpers (bsc#1174438).
- btrfs: add new helper btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: Always use a cached extent_state in btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: always wait on ordered extents at fsync time (bsc#1171761).
- btrfs: clean up the left over logged_list usage (bsc#1171761).
- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: fix extent_state leak in btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).
- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).
- Btrfs: fix list_add corruption and soft lockups in fsync (bsc#1171761).
- Btrfs: fix missing data checksums after a ranged fsync (msync) (bsc#1171761).
- btrfs: fix missing file extent item for hole after ranged fsync (bsc#1171761).
- Btrfs: fix missing hole after hole punching and fsync when using NO_HOLES (bsc#1171761).
- btrfs: fix missing semaphore unlock in btrfs_sync_file (bsc#1171761).
- Btrfs: fix rare chances for data loss when doing a fast fsync (bsc#1171761).
- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).
- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).
- btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).
- btrfs: Remove extra parentheses from condition in copy_items() (bsc#1171761).
- Btrfs: remove no longer used io_err from btrfs_log_ctx (bsc#1171761).
- Btrfs: remove no longer used logged range variables when logging extents (bsc#1171761).
- Btrfs: remove no longer used 'sync' member from transaction handle (bsc#1171761).
- btrfs: remove remaing full_sync logic from btrfs_sync_file (bsc#1171761).
- btrfs: remove the logged extents infrastructure (bsc#1171761).
- btrfs: remove the wait ordered logic in the log_one_extent path (bsc#1171761).
- btrfs: Return EAGAIN if we can't start no snpashot write in check_can_nocow (bsc#1174438).
- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).
- btrfs: Use newly introduced btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).
- bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads (bsc#1111666).
- carl9170: remove P2P_GO support (bsc#1111666).
- ceph: convert mdsc->cap_dirty to a per-session list (bsc#1167104).
- ceph: request expedited service on session's last cap flush (bsc#1167104).
- cgroup, blkcg: Prepare some symbols for module and !CONFIG_CGROUP usages (bsc#1173857).
- clocksource: dw_apb_timer: Make CPU-affiliation being optional (bsc#1111666).
- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1174549
- crypto: algboss - do not wait during notifier callback (bsc#1111666).
- crypto: algif_skcipher - Cap recv SG list at ctx->used (bsc#1111666).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (bsc#1111666).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).
- Crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).
- crypto: talitos - fix IPsec cipher in length (git-fixes).
- crypto: talitos - reorder code in talitos_edesc_alloc() (git-fixes).
- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).
- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).
- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).
- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).
- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).
- driver-core, libnvdimm: Let device subsystems add local lockdep coverage (bsc#1171753).
- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617, bsc#1170618).
- drm: bridge: adv7511: Extend list of audio sample rates (bsc#1111666).
- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1113956) * context changes
- drm: encoder_slave: fix refcouting error for modules (bsc#1111666).
- drm: encoder_slave: fix refcouting error for modules (bsc#1114279)
- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1112178)
- drm/mediatek: Check plane visibility in atomic_update (bsc#1113956) * context changes
- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1111666).
- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (bsc#1111666).
- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (bsc#1111666).
- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1113956)
- drm/radeon: fix double free (bsc#1113956)
- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1113956)
- drm/sun4i: hdmi ddc clk: Fix size of m divider (bsc#1111666).
- drm/tegra: hub: Do not enable orphaned window group (bsc#1111666).
- drm/vkms: Hold gem object while still in-use (bsc#1113956) * context changes
- e1000: Distribute switch variables for initialization (bsc#1111666).
- e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).
- e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).
- e1000e: Relax condition to trigger reset for ME workaround (bsc#1111666).
- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).
- ext4: fix a data race at inode->i_blocks (bsc#1171835).
- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).
- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).
- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).
- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).
- Fix boot crash with MD (bsc#1174343)
- fix multiplication overflow in copy_fdtable() (bsc#1173825).
- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).
- gpu: host1x: Detach driver on unregister (bsc#1111666).
- HID: magicmouse: do not set up autorepeat (git-fixes).
- hv_netvsc: Fix netvsc_start_xmit's return type (git-fixes).
- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (bsc#1111666).
- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (bsc#1111666).
- hwmon: (max6697) Make sure the OVERT mask is set correctly (bsc#1111666).
- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (bsc#1111666).
- i2c: eg20t: Load module automatically if ID matches (bsc#1111666).
- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (bsc#1111666).
- i40e: reduce stack usage in i40e_set_fc (git-fixes).
- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).
- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- iio:health:afe4404 Fix timestamp alignment and prevent data leak (bsc#1111666).
- iio:humidity:hdc100x Fix alignment and data leak issues (bsc#1111666).
- iio:magnetometer:ak8974: Fix alignment and data leak issues (bsc#1111666).
- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (bsc#1111666).
- iio:pressure:ms5611 Fix buffer element alignment (bsc#1111666).
- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (bsc#1111666).
- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (bsc#1111666).
- input: i8042 - Remove special PowerPC handling (git-fixes).
- Input: synaptics - add a second working PNP_ID for Lenovo T470s (bsc#1111666).
- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).
- intel_th: Fix a NULL dereference when hub driver is not loaded (bsc#1111666).
- iommu/vt-d: Enable PCI ACS for platform opt in hint (bsc#1174130).
- ipvlan: call dev_change_flags when ipvlan mode is reset (git-fixes).
- ixgbevf: Remove limit of 10 entries for unicast filter list (git-fixes).
- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).
- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).
- kabi: hv: prevent struct device_node to become defined (bsc#1172871).
- kABI: protect struct mlx5_cmd_work_ent (kabi).
- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).
- kernfs: fix barrier usage in __kernfs_new_node() (bsc#1111666).
- KVM: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).
- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).
- KVM: x86: Fix APIC page invalidation race (bsc#1174122).
- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).
- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).
- libceph: do not omit recovery_deletes in target_copy() (bsc#1173462).
- libceph: do not omit recovery_deletes in target_copy() (bsc#1174113).
- libceph: ignore pool overlay and cache logic on redirects (bsc#1173146).
- libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA deadlock (bsc#1171753).
- libnvdimm/bus: Prepare the nd_ioctl() path to be re-entrant (bsc#1171753).
- libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over __nd_ioctl() (bsc#1171753).
- libnvdimm: cover up changes in struct nvdimm_bus (bsc#1171753).
- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).
- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).
- libnvdimm/label: Remove the dpa align check (bsc#1171759).
- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).
- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).
- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).
- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).
- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).
- libnvdimm/region: Initialize bad block for volatile namespaces (bnc#1151927 5.3.6).
- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).
- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).
- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).
- lpfc_debugfs: get rid of pointless access_ok() (bsc#1172687 bsc#1171530).
- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).
- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).
- media: si2157: Better check for running tuner in init (bsc#1111666).
- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered workqueue (git-fixes).
- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw workqueue (git-fixes).
- mlxsw: pci: Return error on PCI reset timeout (git-fixes).
- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).
- mlxsw: spectrum: Disallow prio-tagged packets when PVID is removed (git-fixes).
- mlxsw: spectrum_dpipe: Add missing error path (git-fixes).
- mlxsw: spectrum: Prevent force of 56G (git-fixes).
- mlxsw: spectrum_router: Refresh nexthop neighbour when it becomes dead (git-fixes).
- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (git-fixes).
- mlxsw: spectrum_switchdev: Add MDB entries in prepare phase (git-fixes).
- mlxsw: spectrum_switchdev: Do not treat static FDB entries as sticky (git-fixes).
- mmc: sdhci: do not enable card detect interrupt for gpio cd type (bsc#1111666).
- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (bsc#1111666).
- mvpp2: remove misleading comment (git-fixes).
- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).
- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).
- net/cxgb4: Check the return from t4_query_params properly (git-fixes).
- net: dsa: bcm_sf2: Fix node reference count (git-fixes).
- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).
- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).
- net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it (git-fixes).
- net: ena: add missing ethtool TX timestamping indication (git-fixes).
- net: ena: avoid memory access violation by validating req_id properly (git-fixes).
- net: ena: do not wake up tx queue when down (git-fixes).
- net: ena: ena-com.c: prevent NULL pointer dereference (git-fixes).
- net: ena: ethtool: use correct value for crc32 hash (git-fixes).
- net: ena: fix continuous keep-alive resets (git-fixes).
- net: ena: fix corruption of dev_idx_to_host_tbl (git-fixes).
- net: ena: fix default tx interrupt moderation interval (git-fixes).
- net: ena: fix incorrect default RSS key (git-fixes).
- net: ena: fix incorrectly saving queue numbers when setting RSS indirection table (git-fixes).
- net: ena: fix issues in setting interrupt moderation params in ethtool (git-fixes).
- net: ena: fix potential crash when rxfh key is NULL (git-fixes).
- net: ena: fix retrieval of nonadaptive interrupt moderation intervals (git-fixes).
- net: ena: fix uses of round_jiffies() (git-fixes).
- net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE (git-fixes).
- net: ena: reimplement set/get_coalesce() (git-fixes).
- net: ena: rss: do not allocate key when not supported (git-fixes).
- net: ena: rss: fix failure to get indirection table (git-fixes).
- net: ena: rss: store hash function as values and not bits (git-fixes).
- netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).
- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).
- net: inet_csk: Fix so_reuseport bind-address cache in tb->fast* (networking-stable-20_05_27).
- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).
- net: ipvlan: Fix ipvlan device tso disabled while NETIF_F_IP_CSUM is set (git-fixes).
- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).
- net/mlx4_core: drop useless LIST_HEAD (git-fixes).
- net/mlx4_core: fix a memory leak bug (git-fixes).
- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).
- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).
- net/mlx5: Avoid panic when setting vport rate (git-fixes).
- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).
- net/mlx5e: ethtool, Fix a typo in WOL function names (git-fixes).
- net/mlx5e: Fix traffic duplication in ethtool steering (git-fixes).
- net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).
- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).
- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).
- net/mlx5: Fix crash upon suspend/resume (networking-stable-20_06_07).
- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).
- net: mvmdio: allow up to four clocks to be specified for orion-mdio (git-fixes).
- net: mvpp2: prs: Do not override the sign bit in SRAM parser shift (git-fixes).
- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).
- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).
- net: qede: stop adding events on an already destroyed workqueue (git-fixes).
- net: qed: fix excessive QM ILT lines consumption (git-fixes).
- net: qed: fix NVMe login fails over VFs (git-fixes).
- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).
- net: revert 'net: get rid of an signed integer overflow in ip_idents_reserve()' (networking-stable-20_05_27).
- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).
- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).
- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).
- net: usb: qmi_wwan: add Telit 0x1050 composition (networking-stable-20_06_07).
- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).
- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).
- nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K (git-fixes).
- nilfs2: fix null pointer dereference at nilfs_segctor_do_construct() (bsc#1173857).
- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).
- nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).
- nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).
- objtool: Clean instruction state before each function validation (bsc#1169514).
- objtool: Ignore empty alternatives (bsc#1169514).
- ocfs2: no need try to truncate file beyond i_size (bsc#1171841).
- padata: ensure the reorder timer callback runs on the correct CPU (git-fixes).
- padata: reorder work kABI fixup (git-fixes).
- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).
- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).
- PCI: Generalize multi-function power dependency device links (bsc#1111666).
- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871, bsc#1172872).
- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871, bsc#1172872).
- PCI: hv: Introduce hv_msi_entry (bsc#1172871, bsc#1172872).
- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871, bsc#1172872).
- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871, bsc#1172872).
- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871, bsc#1172872).
- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871, bsc#1172872).
- PCI: pciehp: Fix indefinite wait on sysfs requests (git-fixes).
- PCI: pciehp: Support interrupts sent from D3hot (git-fixes).
- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).
- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).
- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).
- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).
- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).
- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).
- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).
- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).
- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).
- perf/x86/amd/iommu: Make the 'amd_iommu_attr_groups' symbol static (git-fixes).
- perf/x86/amd/iommu: Make the 'amd_iommu_attr_groups' symbol static (git-fixes).
- perf/x86/amd/uncore: Do not set 'ThreadMask' and 'SliceMask' for non-L3 PMCs (git-fixes stable).
- perf/x86/amd/uncore: Do not set 'ThreadMask' and 'SliceMask' for non-L3 PMCs (git-fixes stable).
- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).
- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).
- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).
- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).
- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).
- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).
- perf/x86: Fix incorrect PEBS_REGS (git-fixes).
- perf/x86: Fix incorrect PEBS_REGS (git-fixes).
- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).
- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).
- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).
- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).
- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).
- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).
- perf/x86/intel: Fix PT PMI handling (git-fixes).
- perf/x86/intel: Fix PT PMI handling (git-fixes).
- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).
- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).
- perf/x86/intel/uncore: Add Node ID mask (git-fixes).
- perf/x86/intel/uncore: Add Node ID mask (git-fixes).
- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).
- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).
- perf/x86/intel/uncore: Handle invalid event coding for free-running counter (git-fixes).
- perf/x86/uncore: Fix event group support (git-fixes).
- perf/x86/uncore: Fix event group support (git-fixes).
- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (bsc#1111666).
- PM / Domains: Allow genpd users to specify default active wakeup behavior (git-fixes).
- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).
- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).
- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).
- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).
- power: vexpress: add suppress_bind_attrs to true (bsc#1111666).
- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).
- qed: reduce maximum stack frame size (git-fixes).
- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).
- r8152: support additional Microsoft Surface Ethernet Adapter variant (networking-stable-20_05_27).
- RDMA/efa: Set maximum pkeys device attribute (bsc#1111666)
- README.BRANCH: Add Takashi Iwai as primary maintainer.
- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (bsc#1111666).
- Revert commit e918e570415c ('tpm_tis: Remove the HID IFX0102') (bsc#1111666).
- Revert 'thermal: mediatek: fix register index error' (bsc#1111666).
- rpm/kernel-docs.spec.in: Require python-packaging for build.
- rtnetlink: Fix memory(net_device) leak when ->newlink fails (git-fixes).
- s390: fix syscall_get_error for compat processes (git-fixes).
- s390/qdio: consistently restore the IRQ handler (git-fixes).
- s390/qdio: lock device while installing IRQ handler (git-fixes).
- s390/qdio: put thinint indicator after early error (git-fixes).
- s390/qdio: tear down thinint indicator after early error (git-fixes).
- s390/qeth: fix error handling for isolation mode cmds (git-fixes).
- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).
- sch_sfq: validate silly quantum values (networking-stable-20_05_12).
- scripts/git_sort/git_sort.py: add bluetooth/bluetooth-next.git repository
- scsi: aacraid: fix a signedness bug (bsc#1174296).
- scsi: hisi_sas: fix calls to dma_set_mask_and_coherent() (bsc#1174296).
- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).
- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).
- scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix inconsistent indenting (bsc#1158983).
- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1158983).
- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1158983).
- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).
- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1158983).
- scsi: megaraid_sas: Fix a compilation warning (bsc#1174296).
- scsi: mpt3sas: Fix double free in attach error handling (bsc#1174296).
- scsi: qedf: Add port_id getter (bsc#1150660).
- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1174296).
- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).
- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).
- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).
- spi: fix initial SPI_SR value in spi-fsl-dspi (bsc#1111666).
- spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).
- spi: spidev: fix a race between spidev_release and spidev_remove (bsc#1111666).
- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (bsc#1111666).
- staging: comedi: verify array index is correct before using it (bsc#1111666).
- SUNRPC: The TCP back channel mustn't disappear while requests are outstanding (bsc#1152624).
- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).
- timers: Add a function to start/reduce a timer (networking-stable-20_05_27).
- tpm_tis: extra chip->ops check on error path in tpm_tis_core_init (bsc#1111666).
- tpm_tis: Remove the HID IFX0102 (bsc#1111666).
- tracing: Fix event trigger to accept redundant spaces (git-fixes).
- tty: hvc_console, fix crashes on parallel open/close (git-fixes).
- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).
- ubifs: remove broken lazytime support (bsc#1173826).
- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).
- USB: c67x00: fix use after free in c67x00_giveback_urb (bsc#1111666).
- usb: chipidea: core: add wakeup support for extcon (bsc#1111666).
- usb: dwc2: Fix shutdown callback in platform (bsc#1111666).
- usb: dwc3: gadget: introduce cancelled_list (git-fixes).
- usb: dwc3: gadget: never call ->complete() from ->ep_queue() (git-fixes).
- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).
- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).
- USB: ehci: reopen solution for Synopsys HC bug (git-fixes).
- usb: gadget: fix potential double-free in m66592_probe (bsc#1111666).
- usb: gadget: udc: atmel: fix uninitialized read in debug printk (bsc#1111666).
- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (bsc#1111666).
- usb: gadget: udc: Potential Oops in error handling code (bsc#1111666).
- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (bsc#1111666).
- usbnet: smsc95xx: Fix use-after-free after removal (bsc#1111666).
- USB: ohci-sm501: Add missed iounmap() in remove (bsc#1111666).
- USB: serial: ch341: add new Product ID for CH340 (bsc#1111666).
- USB: serial: cypress_m8: enable Simply Automated UPB PIM (bsc#1111666).
- USB: serial: iuu_phoenix: fix memory corruption (bsc#1111666).
- USB: serial: option: add GosunCn GM500 series (bsc#1111666).
- USB: serial: option: add Quectel EG95 LTE modem (bsc#1111666).
- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174123).
- vfs: Fix EOVERFLOW testing in put_compat_statfs64 (bnc#1151927 5.3.6).
- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).
- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).
- vmxnet3: add support to get/set rx flow hash (bsc#1172484).
- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).
- vmxnet3: avoid format strint overflow warning (bsc#1172484).
- vmxnet3: prepare for version 4 changes (bsc#1172484).
- vmxnet3: Remove always false conditional statement (bsc#1172484).
- vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1172484).
- vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1172484).
- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).
- vmxnet3: update to version 4 (bsc#1172484).
- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).
- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).
- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (git-fixes).
- wil6210: make sure Rx ring sizes are correlated (git-fixes).
- x86/apic: Install an empty physflat_init_apic_ldr (bsc#1163309).
- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).
- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).
- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).
- x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).
- xhci: Fix incorrect EP_STATE_MASK (git-fixes).
Patchnames
SUSE-2020-2119,SUSE-SLE-SERVER-12-SP5-2020-2119
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-15780: A lockdown bypass for loading unsigned modules using ACPI table injection was fixed. (bsc#1173573)\n- CVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).\n- CVE-2020-12771: An issue was discovered in btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).\n- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n- CVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).\n- CVE-2020-14416: Fixed a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n- CVE-2020-0305: Fixed a possible use-after-free due to a race condition incdev_get of char_dev.c. This could lead to local escalation of privilege. User interaction is not needed for exploitation (bnc#1174462).\n- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n- CVE-2020-10781: Fixed a denial of service issue in the ZRAM implementation (bnc#1173074).\n- CVE-2019-20908: Fixed incorrect access permissions for the efivar_ssdt ACPI variable, which could be used by attackers to bypass lockdown or secure boot restrictions (bnc#1173567).\n- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c, related to invalid length checks for variable elements in a beacon head (bnc#1152107).\n- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n- CVE-2020-14331: Fixed a buffer over write in vgacon_scrollback_update() (bnc#1174205).\n\nThe following non-security bugs were fixed:\n\n- ACPI: GED: add support for _Exx / _Lxx handler methods (bsc#1111666).\n- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (bsc#1111666).\n- ACPI: NFIT: Fix unlock on error in scrub_show() (bsc#1171753).\n- ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).\n- ACPI: video: Use native backlight on Acer Aspire 5783z (bsc#1111666).\n- ACPI: video: Use native backlight on Acer TravelMate 5735Z (bsc#1111666).\n- ALSA: hda - let hs_mic be picked ahead of hp_mic (bsc#1111666).\n- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (bsc#1111666).\n- ALSA: lx6464es - add support for LX6464ESe pci express variant (bsc#1111666).\n- ALSA: opl3: fix infoleak in opl3 (bsc#1111666).\n- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (bsc#1111666).\n- ALSA: usb-audio: Fix packet size calculation (bsc#1111666).\n- ALSA: usb-audio: Improve frames size computation (bsc#1111666).\n- amdgpu: a NULL -\u003emm does not mean a thread is a kthread (git-fixes).\n- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (bsc#1111666).\n- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (bsc#1111666).\n- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (bsc#1111666).\n- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (bsc#1111666).\n- ax25: fix setsockopt(SO_BINDTODEVICE) (networking-stable-20_05_27).\n- b43: Fix connection problem with WPA3 (bsc#1111666).\n- b43_legacy: Fix connection problem with WPA3 (bsc#1111666).\n- be2net: fix link failure after ethtool offline test (git-fixes).\n- block, bfq: add requeue-request hook (bsc#1104967 bsc#1171673).\n- block, bfq: postpone rq preparation to insert or merge (bsc#1104967 bsc#1171673).\n- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).\n- Bluetooth: Add SCO fallback for invalid LMP parameters error (bsc#1111666).\n- bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).\n- bnxt_en: Fix ethtool selftest crash under error conditions (git-fixes).\n- bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE cmd fails (git-fixes).\n- bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).\n- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (git-fixes).\n- bnxt_en: Fix VF anti-spoof filter setup (networking-stable-20_05_12).\n- bnxt_en: Fix VLAN acceleration handling in bnxt_fix_features() (networking-stable-20_05_12).\n- bnxt_en: Improve AER slot reset (networking-stable-20_05_12).\n- brcmfmac: Transform compatible string for FW loading (bsc#1169771).\n- btrfs: add assertions for tree == inode-\u003eio_tree to extent IO helpers (bsc#1174438).\n- btrfs: add new helper btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: Always use a cached extent_state in btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: always wait on ordered extents at fsync time (bsc#1171761).\n- btrfs: clean up the left over logged_list usage (bsc#1171761).\n- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: fix extent_state leak in btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).\n- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).\n- Btrfs: fix list_add corruption and soft lockups in fsync (bsc#1171761).\n- Btrfs: fix missing data checksums after a ranged fsync (msync) (bsc#1171761).\n- btrfs: fix missing file extent item for hole after ranged fsync (bsc#1171761).\n- Btrfs: fix missing hole after hole punching and fsync when using NO_HOLES (bsc#1171761).\n- btrfs: fix missing semaphore unlock in btrfs_sync_file (bsc#1171761).\n- Btrfs: fix rare chances for data loss when doing a fast fsync (bsc#1171761).\n- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).\n- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).\n- btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).\n- btrfs: Remove extra parentheses from condition in copy_items() (bsc#1171761).\n- Btrfs: remove no longer used io_err from btrfs_log_ctx (bsc#1171761).\n- Btrfs: remove no longer used logged range variables when logging extents (bsc#1171761).\n- Btrfs: remove no longer used \u0027sync\u0027 member from transaction handle (bsc#1171761).\n- btrfs: remove remaing full_sync logic from btrfs_sync_file (bsc#1171761).\n- btrfs: remove the logged extents infrastructure (bsc#1171761).\n- btrfs: remove the wait ordered logic in the log_one_extent path (bsc#1171761).\n- btrfs: Return EAGAIN if we can\u0027t start no snpashot write in check_can_nocow (bsc#1174438).\n- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).\n- btrfs: Use newly introduced btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).\n- bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads (bsc#1111666).\n- carl9170: remove P2P_GO support (bsc#1111666).\n- ceph: convert mdsc-\u003ecap_dirty to a per-session list (bsc#1167104).\n- ceph: request expedited service on session\u0027s last cap flush (bsc#1167104).\n- cgroup, blkcg: Prepare some symbols for module and !CONFIG_CGROUP usages (bsc#1173857).\n- clocksource: dw_apb_timer: Make CPU-affiliation being optional (bsc#1111666).\n- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1174549\n- crypto: algboss - do not wait during notifier callback (bsc#1111666).\n- crypto: algif_skcipher - Cap recv SG list at ctx-\u003eused (bsc#1111666).\n- crypto: cavium/nitrox - Fix \u0027nitrox_get_first_device()\u0027 when ndevlist is fully iterated (bsc#1111666).\n- crypto: cavium/nitrox - Fix \u0027nitrox_get_first_device()\u0027 when ndevlist is fully iterated (git-fixes).\n- Crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).\n- crypto: talitos - fix IPsec cipher in length (git-fixes).\n- crypto: talitos - reorder code in talitos_edesc_alloc() (git-fixes).\n- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).\n- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).\n- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).\n- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).\n- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).\n- driver-core, libnvdimm: Let device subsystems add local lockdep coverage (bsc#1171753).\n- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617, bsc#1170618).\n- drm: bridge: adv7511: Extend list of audio sample rates (bsc#1111666).\n- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1113956) * context changes\n- drm: encoder_slave: fix refcouting error for modules (bsc#1111666).\n- drm: encoder_slave: fix refcouting error for modules (bsc#1114279)\n- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1112178)\n- drm/mediatek: Check plane visibility in atomic_update (bsc#1113956) * context changes\n- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1111666).\n- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (bsc#1111666).\n- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (bsc#1111666).\n- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1113956)\n- drm/radeon: fix double free (bsc#1113956)\n- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1113956)\n- drm/sun4i: hdmi ddc clk: Fix size of m divider (bsc#1111666).\n- drm/tegra: hub: Do not enable orphaned window group (bsc#1111666).\n- drm/vkms: Hold gem object while still in-use (bsc#1113956) * context changes\n- e1000: Distribute switch variables for initialization (bsc#1111666).\n- e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).\n- e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).\n- e1000e: Relax condition to trigger reset for ME workaround (bsc#1111666).\n- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).\n- ext4: fix a data race at inode-\u003ei_blocks (bsc#1171835).\n- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).\n- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).\n- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).\n- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).\n- Fix boot crash with MD (bsc#1174343) \n- fix multiplication overflow in copy_fdtable() (bsc#1173825).\n- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).\n- gpu: host1x: Detach driver on unregister (bsc#1111666).\n- HID: magicmouse: do not set up autorepeat (git-fixes).\n- hv_netvsc: Fix netvsc_start_xmit\u0027s return type (git-fixes).\n- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (bsc#1111666).\n- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (bsc#1111666).\n- hwmon: (max6697) Make sure the OVERT mask is set correctly (bsc#1111666).\n- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (bsc#1111666).\n- i2c: eg20t: Load module automatically if ID matches (bsc#1111666).\n- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (bsc#1111666).\n- i40e: reduce stack usage in i40e_set_fc (git-fixes).\n- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).\n- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).\n- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).\n- ibmvnic: Flush existing work items before device removal (bsc#1065729).\n- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).\n- iio:health:afe4404 Fix timestamp alignment and prevent data leak (bsc#1111666).\n- iio:humidity:hdc100x Fix alignment and data leak issues (bsc#1111666).\n- iio:magnetometer:ak8974: Fix alignment and data leak issues (bsc#1111666).\n- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (bsc#1111666).\n- iio:pressure:ms5611 Fix buffer element alignment (bsc#1111666).\n- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (bsc#1111666).\n- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (bsc#1111666).\n- input: i8042 - Remove special PowerPC handling (git-fixes).\n- Input: synaptics - add a second working PNP_ID for Lenovo T470s (bsc#1111666).\n- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).\n- intel_th: Fix a NULL dereference when hub driver is not loaded (bsc#1111666).\n- iommu/vt-d: Enable PCI ACS for platform opt in hint (bsc#1174130).\n- ipvlan: call dev_change_flags when ipvlan mode is reset (git-fixes).\n- ixgbevf: Remove limit of 10 entries for unicast filter list (git-fixes).\n- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).\n- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).\n- kabi: hv: prevent struct device_node to become defined (bsc#1172871).\n- kABI: protect struct mlx5_cmd_work_ent (kabi).\n- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).\n- kernfs: fix barrier usage in __kernfs_new_node() (bsc#1111666).\n- KVM: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).\n- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).\n- KVM: x86: Fix APIC page invalidation race (bsc#1174122).\n- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).\n- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).\n- libceph: do not omit recovery_deletes in target_copy() (bsc#1173462).\n- libceph: do not omit recovery_deletes in target_copy() (bsc#1174113).\n- libceph: ignore pool overlay and cache logic on redirects (bsc#1173146).\n- libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA deadlock (bsc#1171753).\n- libnvdimm/bus: Prepare the nd_ioctl() path to be re-entrant (bsc#1171753).\n- libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over __nd_ioctl() (bsc#1171753).\n- libnvdimm: cover up changes in struct nvdimm_bus (bsc#1171753).\n- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).\n- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).\n- libnvdimm/label: Remove the dpa align check (bsc#1171759).\n- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).\n- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).\n- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).\n- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).\n- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).\n- libnvdimm/region: Initialize bad block for volatile namespaces (bnc#1151927 5.3.6).\n- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).\n- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).\n- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).\n- lpfc_debugfs: get rid of pointless access_ok() (bsc#1172687 bsc#1171530).\n- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).\n- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).\n- media: si2157: Better check for running tuner in init (bsc#1111666).\n- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered workqueue (git-fixes).\n- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw workqueue (git-fixes).\n- mlxsw: pci: Return error on PCI reset timeout (git-fixes).\n- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).\n- mlxsw: spectrum: Disallow prio-tagged packets when PVID is removed (git-fixes).\n- mlxsw: spectrum_dpipe: Add missing error path (git-fixes).\n- mlxsw: spectrum: Prevent force of 56G (git-fixes).\n- mlxsw: spectrum_router: Refresh nexthop neighbour when it becomes dead (git-fixes).\n- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (git-fixes).\n- mlxsw: spectrum_switchdev: Add MDB entries in prepare phase (git-fixes).\n- mlxsw: spectrum_switchdev: Do not treat static FDB entries as sticky (git-fixes).\n- mmc: sdhci: do not enable card detect interrupt for gpio cd type (bsc#1111666).\n- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (bsc#1111666).\n- mvpp2: remove misleading comment (git-fixes).\n- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).\n- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).\n- net/cxgb4: Check the return from t4_query_params properly (git-fixes).\n- net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).\n- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).\n- net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it (git-fixes).\n- net: ena: add missing ethtool TX timestamping indication (git-fixes).\n- net: ena: avoid memory access violation by validating req_id properly (git-fixes).\n- net: ena: do not wake up tx queue when down (git-fixes).\n- net: ena: ena-com.c: prevent NULL pointer dereference (git-fixes).\n- net: ena: ethtool: use correct value for crc32 hash (git-fixes).\n- net: ena: fix continuous keep-alive resets (git-fixes).\n- net: ena: fix corruption of dev_idx_to_host_tbl (git-fixes).\n- net: ena: fix default tx interrupt moderation interval (git-fixes).\n- net: ena: fix incorrect default RSS key (git-fixes).\n- net: ena: fix incorrectly saving queue numbers when setting RSS indirection table (git-fixes).\n- net: ena: fix issues in setting interrupt moderation params in ethtool (git-fixes).\n- net: ena: fix potential crash when rxfh key is NULL (git-fixes).\n- net: ena: fix retrieval of nonadaptive interrupt moderation intervals (git-fixes).\n- net: ena: fix uses of round_jiffies() (git-fixes).\n- net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE (git-fixes).\n- net: ena: reimplement set/get_coalesce() (git-fixes).\n- net: ena: rss: do not allocate key when not supported (git-fixes).\n- net: ena: rss: fix failure to get indirection table (git-fixes).\n- net: ena: rss: store hash function as values and not bits (git-fixes).\n- netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).\n- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).\n- net: inet_csk: Fix so_reuseport bind-address cache in tb-\u003efast* (networking-stable-20_05_27).\n- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).\n- net: ipvlan: Fix ipvlan device tso disabled while NETIF_F_IP_CSUM is set (git-fixes).\n- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).\n- net/mlx4_core: drop useless LIST_HEAD (git-fixes).\n- net/mlx4_core: fix a memory leak bug (git-fixes).\n- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).\n- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).\n- net/mlx5: Avoid panic when setting vport rate (git-fixes).\n- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).\n- net/mlx5e: ethtool, Fix a typo in WOL function names (git-fixes).\n- net/mlx5e: Fix traffic duplication in ethtool steering (git-fixes).\n- net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).\n- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).\n- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).\n- net/mlx5: Fix crash upon suspend/resume (networking-stable-20_06_07).\n- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).\n- net: mvmdio: allow up to four clocks to be specified for orion-mdio (git-fixes).\n- net: mvpp2: prs: Do not override the sign bit in SRAM parser shift (git-fixes).\n- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).\n- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).\n- net: qede: stop adding events on an already destroyed workqueue (git-fixes).\n- net: qed: fix excessive QM ILT lines consumption (git-fixes).\n- net: qed: fix NVMe login fails over VFs (git-fixes).\n- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).\n- net: revert \u0027net: get rid of an signed integer overflow in ip_idents_reserve()\u0027 (networking-stable-20_05_27).\n- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).\n- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).\n- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).\n- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).\n- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).\n- net: usb: qmi_wwan: add Telit 0x1050 composition (networking-stable-20_06_07).\n- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).\n- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).\n- nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K (git-fixes).\n- nilfs2: fix null pointer dereference at nilfs_segctor_do_construct() (bsc#1173857).\n- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).\n- nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).\n- nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).\n- objtool: Clean instruction state before each function validation (bsc#1169514).\n- objtool: Ignore empty alternatives (bsc#1169514).\n- ocfs2: no need try to truncate file beyond i_size (bsc#1171841).\n- padata: ensure the reorder timer callback runs on the correct CPU (git-fixes).\n- padata: reorder work kABI fixup (git-fixes).\n- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).\n- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).\n- PCI: Generalize multi-function power dependency device links (bsc#1111666).\n- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871, bsc#1172872).\n- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871, bsc#1172872).\n- PCI: hv: Introduce hv_msi_entry (bsc#1172871, bsc#1172872).\n- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871, bsc#1172872).\n- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871, bsc#1172872).\n- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871, bsc#1172872).\n- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871, bsc#1172872).\n- PCI: pciehp: Fix indefinite wait on sysfs requests (git-fixes).\n- PCI: pciehp: Support interrupts sent from D3hot (git-fixes).\n- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).\n- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).\n- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).\n- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).\n- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).\n- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).\n- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).\n- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).\n- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).\n- perf/x86/amd/iommu: Make the \u0027amd_iommu_attr_groups\u0027 symbol static (git-fixes).\n- perf/x86/amd/iommu: Make the \u0027amd_iommu_attr_groups\u0027 symbol static (git-fixes).\n- perf/x86/amd/uncore: Do not set \u0027ThreadMask\u0027 and \u0027SliceMask\u0027 for non-L3 PMCs (git-fixes stable).\n- perf/x86/amd/uncore: Do not set \u0027ThreadMask\u0027 and \u0027SliceMask\u0027 for non-L3 PMCs (git-fixes stable).\n- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).\n- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).\n- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).\n- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).\n- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).\n- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).\n- perf/x86: Fix incorrect PEBS_REGS (git-fixes).\n- perf/x86: Fix incorrect PEBS_REGS (git-fixes).\n- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).\n- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).\n- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).\n- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).\n- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).\n- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).\n- perf/x86/intel: Fix PT PMI handling (git-fixes).\n- perf/x86/intel: Fix PT PMI handling (git-fixes).\n- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).\n- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).\n- perf/x86/intel/uncore: Add Node ID mask (git-fixes).\n- perf/x86/intel/uncore: Add Node ID mask (git-fixes).\n- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).\n- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).\n- perf/x86/intel/uncore: Handle invalid event coding for free-running counter (git-fixes).\n- perf/x86/uncore: Fix event group support (git-fixes).\n- perf/x86/uncore: Fix event group support (git-fixes).\n- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (bsc#1111666).\n- PM / Domains: Allow genpd users to specify default active wakeup behavior (git-fixes).\n- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).\n- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).\n- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).\n- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).\n- power: vexpress: add suppress_bind_attrs to true (bsc#1111666).\n- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).\n- qed: reduce maximum stack frame size (git-fixes).\n- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).\n- r8152: support additional Microsoft Surface Ethernet Adapter variant (networking-stable-20_05_27).\n- RDMA/efa: Set maximum pkeys device attribute (bsc#1111666)\n- README.BRANCH: Add Takashi Iwai as primary maintainer.\n- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (bsc#1111666).\n- Revert commit e918e570415c (\u0027tpm_tis: Remove the HID IFX0102\u0027) (bsc#1111666).\n- Revert \u0027thermal: mediatek: fix register index error\u0027 (bsc#1111666).\n- rpm/kernel-docs.spec.in: Require python-packaging for build.\n- rtnetlink: Fix memory(net_device) leak when -\u003enewlink fails (git-fixes).\n- s390: fix syscall_get_error for compat processes (git-fixes).\n- s390/qdio: consistently restore the IRQ handler (git-fixes).\n- s390/qdio: lock device while installing IRQ handler (git-fixes).\n- s390/qdio: put thinint indicator after early error (git-fixes).\n- s390/qdio: tear down thinint indicator after early error (git-fixes).\n- s390/qeth: fix error handling for isolation mode cmds (git-fixes).\n- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).\n- sch_sfq: validate silly quantum values (networking-stable-20_05_12).\n- scripts/git_sort/git_sort.py: add bluetooth/bluetooth-next.git repository\n- scsi: aacraid: fix a signedness bug (bsc#1174296).\n- scsi: hisi_sas: fix calls to dma_set_mask_and_coherent() (bsc#1174296).\n- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix inconsistent indenting (bsc#1158983).\n- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1158983).\n- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1158983).\n- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1158983).\n- scsi: megaraid_sas: Fix a compilation warning (bsc#1174296).\n- scsi: mpt3sas: Fix double free in attach error handling (bsc#1174296).\n- scsi: qedf: Add port_id getter (bsc#1150660).\n- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1174296).\n- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).\n- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).\n- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).\n- spi: fix initial SPI_SR value in spi-fsl-dspi (bsc#1111666).\n- spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).\n- spi: spidev: fix a race between spidev_release and spidev_remove (bsc#1111666).\n- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (bsc#1111666).\n- staging: comedi: verify array index is correct before using it (bsc#1111666).\n- SUNRPC: The TCP back channel mustn\u0027t disappear while requests are outstanding (bsc#1152624).\n- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).\n- timers: Add a function to start/reduce a timer (networking-stable-20_05_27).\n- tpm_tis: extra chip-\u003eops check on error path in tpm_tis_core_init (bsc#1111666).\n- tpm_tis: Remove the HID IFX0102 (bsc#1111666).\n- tracing: Fix event trigger to accept redundant spaces (git-fixes).\n- tty: hvc_console, fix crashes on parallel open/close (git-fixes).\n- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).\n- ubifs: remove broken lazytime support (bsc#1173826).\n- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).\n- USB: c67x00: fix use after free in c67x00_giveback_urb (bsc#1111666).\n- usb: chipidea: core: add wakeup support for extcon (bsc#1111666).\n- usb: dwc2: Fix shutdown callback in platform (bsc#1111666).\n- usb: dwc3: gadget: introduce cancelled_list (git-fixes).\n- usb: dwc3: gadget: never call -\u003ecomplete() from -\u003eep_queue() (git-fixes).\n- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).\n- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).\n- USB: ehci: reopen solution for Synopsys HC bug (git-fixes).\n- usb: gadget: fix potential double-free in m66592_probe (bsc#1111666).\n- usb: gadget: udc: atmel: fix uninitialized read in debug printk (bsc#1111666).\n- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (bsc#1111666).\n- usb: gadget: udc: Potential Oops in error handling code (bsc#1111666).\n- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (bsc#1111666).\n- usbnet: smsc95xx: Fix use-after-free after removal (bsc#1111666).\n- USB: ohci-sm501: Add missed iounmap() in remove (bsc#1111666).\n- USB: serial: ch341: add new Product ID for CH340 (bsc#1111666).\n- USB: serial: cypress_m8: enable Simply Automated UPB PIM (bsc#1111666).\n- USB: serial: iuu_phoenix: fix memory corruption (bsc#1111666).\n- USB: serial: option: add GosunCn GM500 series (bsc#1111666).\n- USB: serial: option: add Quectel EG95 LTE modem (bsc#1111666).\n- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174123).\n- vfs: Fix EOVERFLOW testing in put_compat_statfs64 (bnc#1151927 5.3.6).\n- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).\n- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).\n- vmxnet3: add support to get/set rx flow hash (bsc#1172484).\n- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).\n- vmxnet3: avoid format strint overflow warning (bsc#1172484).\n- vmxnet3: prepare for version 4 changes (bsc#1172484).\n- vmxnet3: Remove always false conditional statement (bsc#1172484).\n- vmxnet3: remove redundant initialization of pointer \u0027rq\u0027 (bsc#1172484).\n- vmxnet3: remove unused flag \u0027rxcsum\u0027 from struct vmxnet3_adapter (bsc#1172484).\n- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).\n- vmxnet3: update to version 4 (bsc#1172484).\n- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).\n- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).\n- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (git-fixes).\n- wil6210: make sure Rx ring sizes are correlated (git-fixes).\n- x86/apic: Install an empty physflat_init_apic_ldr (bsc#1163309).\n- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).\n- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).\n- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).\n- x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).\n- xhci: Fix incorrect EP_STATE_MASK (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2119,SUSE-SLE-SERVER-12-SP5-2020-2119", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2119-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2119-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202119-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2119-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1104967", "url": "https://bugzilla.suse.com/1104967" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1150660", "url": "https://bugzilla.suse.com/1150660" }, { "category": "self", "summary": "SUSE Bug 1151927", "url": "https://bugzilla.suse.com/1151927" }, { "category": "self", "summary": "SUSE Bug 1152107", "url": "https://bugzilla.suse.com/1152107" }, { "category": "self", "summary": "SUSE Bug 1152624", "url": "https://bugzilla.suse.com/1152624" }, { "category": "self", "summary": "SUSE Bug 1158983", "url": "https://bugzilla.suse.com/1158983" }, { "category": "self", "summary": "SUSE Bug 1159058", "url": "https://bugzilla.suse.com/1159058" }, { "category": "self", "summary": "SUSE Bug 1162002", "url": "https://bugzilla.suse.com/1162002" }, { "category": "self", "summary": "SUSE Bug 1163309", "url": "https://bugzilla.suse.com/1163309" }, { "category": "self", "summary": "SUSE Bug 1167104", "url": "https://bugzilla.suse.com/1167104" }, { "category": "self", "summary": "SUSE Bug 1168959", "url": "https://bugzilla.suse.com/1168959" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169771", "url": "https://bugzilla.suse.com/1169771" }, { "category": "self", "summary": "SUSE Bug 1169795", "url": "https://bugzilla.suse.com/1169795" }, { "category": "self", "summary": "SUSE Bug 1170011", "url": "https://bugzilla.suse.com/1170011" }, { "category": "self", "summary": "SUSE Bug 1170442", "url": "https://bugzilla.suse.com/1170442" }, { "category": "self", "summary": "SUSE Bug 1170617", "url": "https://bugzilla.suse.com/1170617" }, { "category": "self", "summary": "SUSE Bug 1170618", "url": "https://bugzilla.suse.com/1170618" }, { "category": "self", "summary": "SUSE Bug 1171124", "url": "https://bugzilla.suse.com/1171124" }, { "category": "self", "summary": "SUSE Bug 1171424", "url": "https://bugzilla.suse.com/1171424" }, { "category": "self", "summary": "SUSE Bug 1171529", "url": "https://bugzilla.suse.com/1171529" }, { "category": "self", "summary": "SUSE Bug 1171530", "url": "https://bugzilla.suse.com/1171530" }, { "category": "self", "summary": "SUSE Bug 1171558", "url": "https://bugzilla.suse.com/1171558" }, { "category": "self", "summary": "SUSE Bug 1171673", "url": "https://bugzilla.suse.com/1171673" }, { "category": "self", "summary": "SUSE Bug 1171732", "url": "https://bugzilla.suse.com/1171732" }, { "category": "self", "summary": "SUSE Bug 1171739", "url": "https://bugzilla.suse.com/1171739" }, { "category": "self", "summary": "SUSE Bug 1171743", "url": "https://bugzilla.suse.com/1171743" }, { "category": "self", "summary": "SUSE Bug 1171753", "url": "https://bugzilla.suse.com/1171753" }, { "category": "self", "summary": "SUSE Bug 1171759", "url": "https://bugzilla.suse.com/1171759" }, { "category": "self", "summary": "SUSE Bug 1171761", "url": "https://bugzilla.suse.com/1171761" }, { "category": "self", "summary": "SUSE Bug 1171835", "url": "https://bugzilla.suse.com/1171835" }, { "category": "self", "summary": "SUSE Bug 1171841", "url": "https://bugzilla.suse.com/1171841" }, { "category": "self", "summary": "SUSE Bug 1171868", "url": "https://bugzilla.suse.com/1171868" }, { "category": "self", "summary": "SUSE Bug 1171988", "url": "https://bugzilla.suse.com/1171988" }, { "category": "self", "summary": "SUSE Bug 1172247", "url": "https://bugzilla.suse.com/1172247" }, { "category": "self", "summary": "SUSE Bug 1172257", "url": "https://bugzilla.suse.com/1172257" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172484", "url": "https://bugzilla.suse.com/1172484" }, { "category": "self", "summary": "SUSE Bug 1172687", "url": "https://bugzilla.suse.com/1172687" }, { "category": "self", "summary": "SUSE Bug 1172719", "url": "https://bugzilla.suse.com/1172719" }, { "category": "self", "summary": "SUSE Bug 1172871", "url": "https://bugzilla.suse.com/1172871" }, { "category": "self", "summary": "SUSE Bug 1172872", "url": "https://bugzilla.suse.com/1172872" }, { "category": "self", "summary": "SUSE Bug 1172999", "url": "https://bugzilla.suse.com/1172999" }, { "category": "self", "summary": "SUSE Bug 1173060", "url": "https://bugzilla.suse.com/1173060" }, { "category": "self", "summary": "SUSE Bug 1173074", "url": "https://bugzilla.suse.com/1173074" }, { "category": "self", "summary": "SUSE Bug 1173146", "url": "https://bugzilla.suse.com/1173146" }, { "category": "self", "summary": "SUSE Bug 1173265", "url": "https://bugzilla.suse.com/1173265" }, { "category": "self", "summary": "SUSE Bug 1173280", "url": "https://bugzilla.suse.com/1173280" }, { "category": "self", "summary": "SUSE Bug 1173284", "url": "https://bugzilla.suse.com/1173284" }, { "category": "self", "summary": "SUSE Bug 1173428", "url": "https://bugzilla.suse.com/1173428" }, { "category": "self", "summary": "SUSE Bug 1173462", "url": "https://bugzilla.suse.com/1173462" }, { "category": "self", "summary": "SUSE Bug 1173514", "url": "https://bugzilla.suse.com/1173514" }, { "category": "self", "summary": "SUSE Bug 1173567", "url": "https://bugzilla.suse.com/1173567" }, { "category": "self", "summary": "SUSE Bug 1173573", "url": "https://bugzilla.suse.com/1173573" }, { "category": "self", "summary": "SUSE Bug 1173659", "url": "https://bugzilla.suse.com/1173659" }, { "category": "self", "summary": "SUSE Bug 1173746", "url": "https://bugzilla.suse.com/1173746" }, { "category": "self", "summary": "SUSE Bug 1173818", "url": "https://bugzilla.suse.com/1173818" }, { "category": "self", "summary": "SUSE Bug 1173820", "url": "https://bugzilla.suse.com/1173820" }, { "category": "self", "summary": "SUSE Bug 1173825", "url": "https://bugzilla.suse.com/1173825" }, { "category": "self", "summary": "SUSE Bug 1173826", "url": "https://bugzilla.suse.com/1173826" }, { "category": "self", "summary": "SUSE Bug 1173833", "url": "https://bugzilla.suse.com/1173833" }, { "category": "self", "summary": "SUSE Bug 1173838", "url": "https://bugzilla.suse.com/1173838" }, { "category": "self", "summary": "SUSE Bug 1173839", "url": "https://bugzilla.suse.com/1173839" }, { "category": "self", "summary": "SUSE Bug 1173845", "url": "https://bugzilla.suse.com/1173845" }, { "category": "self", "summary": "SUSE Bug 1173857", "url": "https://bugzilla.suse.com/1173857" }, { "category": "self", "summary": "SUSE Bug 1174113", "url": "https://bugzilla.suse.com/1174113" }, { "category": "self", "summary": "SUSE Bug 1174115", "url": "https://bugzilla.suse.com/1174115" }, { "category": "self", "summary": "SUSE Bug 1174122", "url": "https://bugzilla.suse.com/1174122" }, { "category": "self", "summary": "SUSE Bug 1174123", "url": "https://bugzilla.suse.com/1174123" }, { "category": "self", "summary": "SUSE Bug 1174130", "url": "https://bugzilla.suse.com/1174130" }, { "category": "self", "summary": "SUSE Bug 1174186", "url": "https://bugzilla.suse.com/1174186" }, { "category": "self", "summary": "SUSE Bug 1174187", "url": "https://bugzilla.suse.com/1174187" }, { "category": "self", "summary": "SUSE Bug 1174205", "url": "https://bugzilla.suse.com/1174205" }, { "category": "self", "summary": "SUSE Bug 1174247", "url": "https://bugzilla.suse.com/1174247" }, { "category": "self", "summary": "SUSE Bug 1174296", "url": "https://bugzilla.suse.com/1174296" }, { "category": "self", "summary": "SUSE Bug 1174343", "url": "https://bugzilla.suse.com/1174343" }, { "category": "self", "summary": "SUSE Bug 1174356", "url": "https://bugzilla.suse.com/1174356" }, { "category": "self", "summary": "SUSE Bug 1174409", "url": "https://bugzilla.suse.com/1174409" }, { "category": "self", "summary": "SUSE Bug 1174438", "url": "https://bugzilla.suse.com/1174438" }, { "category": "self", "summary": "SUSE Bug 1174462", "url": "https://bugzilla.suse.com/1174462" }, { "category": "self", "summary": "SUSE Bug 1174543", "url": "https://bugzilla.suse.com/1174543" }, { "category": "self", "summary": "SUSE Bug 1174549", "url": "https://bugzilla.suse.com/1174549" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20908 page", "url": "https://www.suse.com/security/cve/CVE-2019-20908/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0305 page", "url": "https://www.suse.com/security/cve/CVE-2020-0305/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10769 page", "url": "https://www.suse.com/security/cve/CVE-2020-10769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10773 page", "url": "https://www.suse.com/security/cve/CVE-2020-10773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10781 page", "url": "https://www.suse.com/security/cve/CVE-2020-10781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12771 page", "url": "https://www.suse.com/security/cve/CVE-2020-12771/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12888 page", "url": "https://www.suse.com/security/cve/CVE-2020-12888/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14416 page", "url": "https://www.suse.com/security/cve/CVE-2020-14416/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15393 page", "url": "https://www.suse.com/security/cve/CVE-2020-15393/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-08-04T13:16:44Z", "generator": { "date": "2020-08-04T13:16:44Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2119-1", "initial_release_date": "2020-08-04T13:16:44Z", "revision_history": [ { "date": "2020-08-04T13:16:44Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-16.22.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-16.22.1.noarch", "product_id": "kernel-devel-azure-4.12.14-16.22.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-16.22.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-16.22.1.noarch", "product_id": "kernel-source-azure-4.12.14-16.22.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-16.22.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-16.22.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-16.22.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-16.22.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-16.22.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-16.22.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-16.22.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-16.22.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-16.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-16.22.1.x86_64", "product": { "name": "kernel-azure-4.12.14-16.22.1.x86_64", "product_id": "kernel-azure-4.12.14-16.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-16.22.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-16.22.1.x86_64", "product_id": "kernel-azure-base-4.12.14-16.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-16.22.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-16.22.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-16.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-16.22.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-16.22.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-16.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-kgraft-devel-4.12.14-16.22.1.x86_64", "product": { "name": "kernel-azure-kgraft-devel-4.12.14-16.22.1.x86_64", "product_id": "kernel-azure-kgraft-devel-4.12.14-16.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-16.22.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-16.22.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-16.22.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-16.22.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-16.22.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-16.22.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-16.22.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-16.22.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-16.22.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-16.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-16.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-16.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-16.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-16.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-16.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-16.22.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-16.22.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-16.22.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-16.22.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-16.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-16.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-16.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-16.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-16.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-16.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-16.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-16.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-16.22.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-16.22.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-16.22.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-16.22.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-16.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-16.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:16:44Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2019-20908", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20908" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/firmware/efi/efi.c in the Linux kernel before 5.4. Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20908", "url": "https://www.suse.com/security/cve/CVE-2019-20908" }, { "category": "external", "summary": "SUSE Bug 1173567 for CVE-2019-20908", "url": "https://bugzilla.suse.com/1173567" }, { "category": "external", "summary": "SUSE Bug 1174187 for CVE-2019-20908", "url": "https://bugzilla.suse.com/1174187" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:16:44Z", "details": "important" } ], "title": "CVE-2019-20908" }, { "cve": "CVE-2020-0305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0305" } ], "notes": [ { "category": "general", "text": "In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0305", "url": "https://www.suse.com/security/cve/CVE-2020-0305" }, { "category": "external", "summary": "SUSE Bug 1174462 for CVE-2020-0305", "url": "https://bugzilla.suse.com/1174462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:16:44Z", "details": "moderate" } ], "title": "CVE-2020-0305" }, { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:16:44Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-10769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10769" } ], "notes": [ { "category": "general", "text": "A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10769", "url": "https://www.suse.com/security/cve/CVE-2020-10769" }, { "category": "external", "summary": "SUSE Bug 1173265 for CVE-2020-10769", "url": "https://bugzilla.suse.com/1173265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:16:44Z", "details": "moderate" } ], "title": "CVE-2020-10769" }, { "cve": "CVE-2020-10773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10773" } ], "notes": [ { "category": "general", "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u0027s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10773", "url": "https://www.suse.com/security/cve/CVE-2020-10773" }, { "category": "external", "summary": "SUSE Bug 1172999 for CVE-2020-10773", "url": "https://bugzilla.suse.com/1172999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:16:44Z", "details": "low" } ], "title": "CVE-2020-10773" }, { "cve": "CVE-2020-10781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10781" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10781", "url": "https://www.suse.com/security/cve/CVE-2020-10781" }, { "category": "external", "summary": "SUSE Bug 1173074 for CVE-2020-10781", "url": "https://bugzilla.suse.com/1173074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:16:44Z", "details": "moderate" } ], "title": "CVE-2020-10781" }, { "cve": "CVE-2020-12771", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12771" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12771", "url": "https://www.suse.com/security/cve/CVE-2020-12771" }, { "category": "external", "summary": "SUSE Bug 1171732 for CVE-2020-12771", "url": "https://bugzilla.suse.com/1171732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:16:44Z", "details": "moderate" } ], "title": "CVE-2020-12771" }, { "cve": "CVE-2020-12888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12888" } ], "notes": [ { "category": "general", "text": "The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12888", "url": "https://www.suse.com/security/cve/CVE-2020-12888" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171868 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1171868" }, { "category": "external", "summary": "SUSE Bug 1176979 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1176979" }, { "category": "external", "summary": "SUSE Bug 1179612 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1179612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:16:44Z", "details": "moderate" } ], "title": "CVE-2020-12888" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:16:44Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14416", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14416" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14416", "url": "https://www.suse.com/security/cve/CVE-2020-14416" }, { "category": "external", "summary": "SUSE Bug 1162002 for CVE-2020-14416", "url": "https://bugzilla.suse.com/1162002" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:16:44Z", "details": "moderate" } ], "title": "CVE-2020-14416" }, { "cve": "CVE-2020-15393", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15393" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15393", "url": "https://www.suse.com/security/cve/CVE-2020-15393" }, { "category": "external", "summary": "SUSE Bug 1173514 for CVE-2020-15393", "url": "https://bugzilla.suse.com/1173514" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:16:44Z", "details": "moderate" } ], "title": "CVE-2020-15393" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:16:44Z", "details": "important" } ], "title": "CVE-2020-15780" } ] }
suse-su-2020:2505-1
Vulnerability from csaf_suse
Published
2020-09-04 11:33
Modified
2020-09-04 11:33
Summary
Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP1)
Description of the patch
This update for the Linux Kernel 4.12.14-197_26 fixes several issues.
The following security issues were fixed:
- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2020-15780: Fixed a lockdown bypass via injection of malicious ACPI tables via configfs (bsc#1174186).
- CVE-2019-0155: Fixed a privilege escalation in the i915 graphics driver (bsc#1173663).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2019-19447: Fixed a use-after-free in ext4_put_super (bsc#1173869).
- CVE-2019-14901: Fixed a heap overflow in the Marvell WiFi driver (bsc#1173661).
- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173100).
Patchnames
SUSE-2020-2505,SUSE-SLE-Live-Patching-12-SP4-2020-2503,SUSE-SLE-Live-Patching-12-SP4-2020-2504,SUSE-SLE-Live-Patching-12-SP4-2020-2505,SUSE-SLE-Live-Patching-12-SP5-2020-2511,SUSE-SLE-Module-Live-Patching-15-2020-2520,SUSE-SLE-Module-Live-Patching-15-2020-2521,SUSE-SLE-Module-Live-Patching-15-2020-2522,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2527,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2528
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-197_26 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).\n- CVE-2020-15780: Fixed a lockdown bypass via injection of malicious ACPI tables via configfs (bsc#1174186).\n- CVE-2019-0155: Fixed a privilege escalation in the i915 graphics driver (bsc#1173663).\n- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).\n- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).\n- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).\n- CVE-2019-19447: Fixed a use-after-free in ext4_put_super (bsc#1173869).\n- CVE-2019-14901: Fixed a heap overflow in the Marvell WiFi driver (bsc#1173661).\n- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173100).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2505,SUSE-SLE-Live-Patching-12-SP4-2020-2503,SUSE-SLE-Live-Patching-12-SP4-2020-2504,SUSE-SLE-Live-Patching-12-SP4-2020-2505,SUSE-SLE-Live-Patching-12-SP5-2020-2511,SUSE-SLE-Module-Live-Patching-15-2020-2520,SUSE-SLE-Module-Live-Patching-15-2020-2521,SUSE-SLE-Module-Live-Patching-15-2020-2522,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2527,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2528", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2505-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2505-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202505-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2505-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" }, { "category": "self", "summary": "SUSE Bug 1173100", "url": "https://bugzilla.suse.com/1173100" }, { "category": "self", "summary": "SUSE Bug 1173659", "url": "https://bugzilla.suse.com/1173659" }, { "category": "self", "summary": "SUSE Bug 1173661", "url": "https://bugzilla.suse.com/1173661" }, { "category": "self", "summary": "SUSE Bug 1173663", "url": "https://bugzilla.suse.com/1173663" }, { "category": "self", "summary": "SUSE Bug 1173869", "url": "https://bugzilla.suse.com/1173869" }, { "category": "self", "summary": "SUSE Bug 1173942", "url": "https://bugzilla.suse.com/1173942" }, { "category": "self", "summary": "SUSE Bug 1173963", "url": "https://bugzilla.suse.com/1173963" }, { "category": "self", "summary": "SUSE Bug 1174186", "url": "https://bugzilla.suse.com/1174186" }, { "category": "self", "summary": "SUSE Bug 1174247", "url": "https://bugzilla.suse.com/1174247" }, { "category": "self", "summary": "SUSE CVE CVE-2019-0155 page", "url": "https://www.suse.com/security/cve/CVE-2019-0155/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14895 page", "url": "https://www.suse.com/security/cve/CVE-2019-14895/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14901 page", "url": "https://www.suse.com/security/cve/CVE-2019-14901/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19447 page", "url": "https://www.suse.com/security/cve/CVE-2019-19447/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9458 page", "url": "https://www.suse.com/security/cve/CVE-2019-9458/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11668 page", "url": "https://www.suse.com/security/cve/CVE-2020-11668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" } ], "title": "Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP1)", "tracking": { "current_release_date": "2020-09-04T11:33:49Z", "generator": { "date": "2020-09-04T11:33:49Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2505-1", "initial_release_date": "2020-09-04T11:33:49Z", "revision_history": [ { "date": "2020-09-04T11:33:49Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "product_id": "kgraft-patch-4_12_14-120-default-6-15.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "product_id": "kgraft-patch-4_12_14-120-default-6-15.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-120-default-6-15.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-120-default-6-15.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0155", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-0155" } ], "notes": [ { "category": "general", "text": "Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-0155", "url": "https://www.suse.com/security/cve/CVE-2019-0155" }, { "category": "external", "summary": "SUSE Bug 1135966 for CVE-2019-0155", "url": "https://bugzilla.suse.com/1135966" }, { "category": "external", "summary": "SUSE Bug 1135967 for CVE-2019-0155", "url": "https://bugzilla.suse.com/1135967" }, { "category": "external", "summary": "SUSE Bug 1173663 for CVE-2019-0155", "url": "https://bugzilla.suse.com/1173663" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:49Z", "details": "important" } ], "title": "CVE-2019-0155" }, { "cve": "CVE-2019-14895", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14895" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14895", "url": "https://www.suse.com/security/cve/CVE-2019-14895" }, { "category": "external", "summary": "SUSE Bug 1157042 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1157042" }, { "category": "external", "summary": "SUSE Bug 1157158 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1157158" }, { "category": "external", "summary": "SUSE Bug 1173100 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1173100" }, { "category": "external", "summary": "SUSE Bug 1173660 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1173660" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:49Z", "details": "important" } ], "title": "CVE-2019-14895" }, { "cve": "CVE-2019-14901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14901" } ], "notes": [ { "category": "general", "text": "A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14901", "url": "https://www.suse.com/security/cve/CVE-2019-14901" }, { "category": "external", "summary": "SUSE Bug 1157042 for CVE-2019-14901", "url": "https://bugzilla.suse.com/1157042" }, { "category": "external", "summary": "SUSE Bug 1173661 for CVE-2019-14901", "url": "https://bugzilla.suse.com/1173661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:49Z", "details": "important" } ], "title": "CVE-2019-14901" }, { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:49Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2019-19447", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19447" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19447", "url": "https://www.suse.com/security/cve/CVE-2019-19447" }, { "category": "external", "summary": "SUSE Bug 1158819 for CVE-2019-19447", "url": "https://bugzilla.suse.com/1158819" }, { "category": "external", "summary": "SUSE Bug 1173869 for CVE-2019-19447", "url": "https://bugzilla.suse.com/1173869" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:49Z", "details": "important" } ], "title": "CVE-2019-19447" }, { "cve": "CVE-2019-9458", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9458" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9458", "url": "https://www.suse.com/security/cve/CVE-2019-9458" }, { "category": "external", "summary": "SUSE Bug 1168295 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1168295" }, { "category": "external", "summary": "SUSE Bug 1173963 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1173963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:49Z", "details": "important" } ], "title": "CVE-2019-9458" }, { "cve": "CVE-2020-11668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11668" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11668", "url": "https://www.suse.com/security/cve/CVE-2020-11668" }, { "category": "external", "summary": "SUSE Bug 1168952 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1168952" }, { "category": "external", "summary": "SUSE Bug 1173942 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1173942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:49Z", "details": "important" } ], "title": "CVE-2020-11668" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:49Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-120-default-6-15.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_21-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_38-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:49Z", "details": "important" } ], "title": "CVE-2020-15780" } ] }
suse-su-2020:2508-1
Vulnerability from csaf_suse
Published
2020-09-04 11:31
Modified
2020-09-04 11:31
Summary
Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP4)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP4)
Description of the patch
This update for the Linux Kernel 4.12.14-95_51 fixes several issues.
The following security issues were fixed:
- CVE-2020-10757: Fixed a privilege escalation in the mremap handling of DAX Huge Pages (bsc#1172437).
- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2020-15780: Fixed a lockdown bypass via injection of malicious ACPI tables via configfs (bsc#1174186).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
Patchnames
SUSE-2020-2508,SUSE-SLE-Live-Patching-12-SP4-2020-2508
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP4)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-95_51 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2020-10757: Fixed a privilege escalation in the mremap handling of DAX Huge Pages (bsc#1172437).\n- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).\n- CVE-2020-15780: Fixed a lockdown bypass via injection of malicious ACPI tables via configfs (bsc#1174186).\n- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2508,SUSE-SLE-Live-Patching-12-SP4-2020-2508", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2508-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2508-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202508-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2508-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007368.html" }, { "category": "self", "summary": "SUSE Bug 1172437", "url": "https://bugzilla.suse.com/1172437" }, { "category": "self", "summary": "SUSE Bug 1173659", "url": "https://bugzilla.suse.com/1173659" }, { "category": "self", "summary": "SUSE Bug 1174186", "url": "https://bugzilla.suse.com/1174186" }, { "category": "self", "summary": "SUSE Bug 1174247", "url": "https://bugzilla.suse.com/1174247" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10757 page", "url": "https://www.suse.com/security/cve/CVE-2020-10757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" } ], "title": "Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP4)", "tracking": { "current_release_date": "2020-09-04T11:31:14Z", "generator": { "date": "2020-09-04T11:31:14Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2508-1", "initial_release_date": "2020-09-04T11:31:14Z", "revision_history": [ { "date": "2020-09-04T11:31:14Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_51-default-4-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_51-default-4-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-95_51-default-4-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_51-default-4-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-95_51-default-4-2.2.s390x", "product_id": "kgraft-patch-4_12_14-95_51-default-4-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_51-default-4-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_51-default-4-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-95_51-default-4-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_51-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_51-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_51-default-4-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_51-default-4-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_51-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_51-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:31:14Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2020-10757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10757" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10757", "url": "https://www.suse.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172317 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172317" }, { "category": "external", "summary": "SUSE Bug 1172437 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172437" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:31:14Z", "details": "important" } ], "title": "CVE-2020-10757" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:31:14Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_51-default-4-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:31:14Z", "details": "important" } ], "title": "CVE-2020-15780" } ] }
suse-su-2020:2509-1
Vulnerability from csaf_suse
Published
2020-09-04 11:31
Modified
2020-09-04 11:31
Summary
Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP4)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP4)
Description of the patch
This update for the Linux Kernel 4.12.14-95_54 fixes several issues.
The following security issues were fixed:
- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2020-15780: Fixed a lockdown bypass via injection of malicious ACPI tables via configfs (bsc#1174186).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2020-1749: Fixed a flaw in IPsec where some IPv6 protocols were not encrypted (bsc#1165631).
Patchnames
SUSE-2020-2509,SUSE-SLE-Live-Patching-12-SP4-2020-2509
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP4)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-95_54 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).\n- CVE-2020-15780: Fixed a lockdown bypass via injection of malicious ACPI tables via configfs (bsc#1174186).\n- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).\n- CVE-2020-1749: Fixed a flaw in IPsec where some IPv6 protocols were not encrypted (bsc#1165631).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2509,SUSE-SLE-Live-Patching-12-SP4-2020-2509", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2509-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2509-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202509-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2509-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007362.html" }, { "category": "self", "summary": "SUSE Bug 1165631", "url": "https://bugzilla.suse.com/1165631" }, { "category": "self", "summary": "SUSE Bug 1173659", "url": "https://bugzilla.suse.com/1173659" }, { "category": "self", "summary": "SUSE Bug 1174186", "url": "https://bugzilla.suse.com/1174186" }, { "category": "self", "summary": "SUSE Bug 1174247", "url": "https://bugzilla.suse.com/1174247" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1749 page", "url": "https://www.suse.com/security/cve/CVE-2020-1749/" } ], "title": "Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP4)", "tracking": { "current_release_date": "2020-09-04T11:31:23Z", "generator": { "date": "2020-09-04T11:31:23Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2509-1", "initial_release_date": "2020-09-04T11:31:23Z", "revision_history": [ { "date": "2020-09-04T11:31:23Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_54-default-2-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_54-default-2-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-95_54-default-2-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_54-default-2-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-95_54-default-2-2.2.s390x", "product_id": "kgraft-patch-4_12_14-95_54-default-2-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_54-default-2-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_54-default-2-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-95_54-default-2-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_54-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_54-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_54-default-2-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_54-default-2-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_54-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_54-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:31:23Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:31:23Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:31:23Z", "details": "important" } ], "title": "CVE-2020-15780" }, { "cve": "CVE-2020-1749", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1749" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1749", "url": "https://www.suse.com/security/cve/CVE-2020-1749" }, { "category": "external", "summary": "SUSE Bug 1165629 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165629" }, { "category": "external", "summary": "SUSE Bug 1165631 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165631" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177513" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1189302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_54-default-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:31:23Z", "details": "important" } ], "title": "CVE-2020-1749" } ] }
suse-su-2020:2534-1
Vulnerability from csaf_suse
Published
2020-09-04 11:34
Modified
2020-09-04 11:34
Summary
Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP1)
Description of the patch
This update for the Linux Kernel 4.12.14-197_51 fixes several issues.
The following security issues were fixed:
- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2020-1749: Fixed a flaw in IPsec where some IPv6 protocols were not encrypted (bsc#1165631).
Patchnames
SUSE-2020-2534,SUSE-SLE-Live-Patching-12-SP4-2020-2510,SUSE-SLE-Live-Patching-12-SP5-2020-2518,SUSE-SLE-Live-Patching-12-SP5-2020-2519,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2534,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2535
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-197_51 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).\n- CVE-2020-1749: Fixed a flaw in IPsec where some IPv6 protocols were not encrypted (bsc#1165631).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2534,SUSE-SLE-Live-Patching-12-SP4-2020-2510,SUSE-SLE-Live-Patching-12-SP5-2020-2518,SUSE-SLE-Live-Patching-12-SP5-2020-2519,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2534,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2535", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2534-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2534-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202534-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2534-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007369.html" }, { "category": "self", "summary": "SUSE Bug 1165631", "url": "https://bugzilla.suse.com/1165631" }, { "category": "self", "summary": "SUSE Bug 1174247", "url": "https://bugzilla.suse.com/1174247" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1749 page", "url": "https://www.suse.com/security/cve/CVE-2020-1749/" } ], "title": "Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP1)", "tracking": { "current_release_date": "2020-09-04T11:34:35Z", "generator": { "date": "2020-09-04T11:34:35Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2534-1", "initial_release_date": "2020-09-04T11:34:35Z", "revision_history": [ { "date": "2020-09-04T11:34:35Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_48-default-2-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_48-default-2-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_48-default-2-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_57-default-2-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_57-default-2-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-95_57-default-2-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_29-default-2-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_29-default-2-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_29-default-2-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_32-default-2-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_32-default-2-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_32-default-2-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_51-default-2-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_51-default-2-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_51-default-2-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_57-default-2-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-95_57-default-2-2.2.s390x", "product_id": "kgraft-patch-4_12_14-95_57-default-2-2.2.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_29-default-2-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-122_29-default-2-2.2.s390x", "product_id": "kgraft-patch-4_12_14-122_29-default-2-2.2.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_32-default-2-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-122_32-default-2-2.2.s390x", "product_id": "kgraft-patch-4_12_14-122_32-default-2-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_48-default-2-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_48-default-2-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-197_48-default-2-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_57-default-2-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_57-default-2-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-95_57-default-2-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_29-default-2-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_29-default-2-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_29-default-2-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_32-default-2-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_32-default-2-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_32-default-2-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_51-default-2-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_51-default-2-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-197_51-default-2-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-2-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-2-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-2-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-2-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-2-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-2-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-2-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-2-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-2-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-2-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-2-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-2-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-2-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-2-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-2-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-2-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-2-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_51-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-2-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_51-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_51-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-2-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_51-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-2-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-2-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_51-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-2-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_51-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_51-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-2-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_51-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:34:35Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-1749", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1749" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1749", "url": "https://www.suse.com/security/cve/CVE-2020-1749" }, { "category": "external", "summary": "SUSE Bug 1165629 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165629" }, { "category": "external", "summary": "SUSE Bug 1165631 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165631" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177513" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1189302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:34:35Z", "details": "important" } ], "title": "CVE-2020-1749" } ] }
suse-su-2020:2537-1
Vulnerability from csaf_suse
Published
2020-09-04 11:34
Modified
2020-09-04 11:34
Summary
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2)
Description of the patch
This update for the Linux Kernel 5.3.18-24_9 fixes one issue.
The following security issue was fixed:
- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
Patchnames
SUSE-2020-2537,SUSE-SLE-Module-Live-Patching-15-SP2-2020-2537
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-24_9 fixes one issue.\n\nThe following security issue was fixed:\n\n- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2537,SUSE-SLE-Module-Live-Patching-15-SP2-2020-2537", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2537-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2537-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202537-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2537-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007371.html" }, { "category": "self", "summary": "SUSE Bug 1174247", "url": "https://bugzilla.suse.com/1174247" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" } ], "title": "Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2)", "tracking": { "current_release_date": "2020-09-04T11:34:54Z", "generator": { "date": "2020-09-04T11:34:54Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2537-1", "initial_release_date": "2020-09-04T11:34:54Z", "revision_history": [ { "date": "2020-09-04T11:34:54Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_9-default-2-2.3.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_9-default-2-2.3.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_9-default-2-2.3.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_9-default-2-2.3.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_9-default-2-2.3.s390x", "product_id": "kernel-livepatch-5_3_18-24_9-default-2-2.3.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_9-default-2-2.3.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_9-default-2-2.3.x86_64", "product_id": "kernel-livepatch-5_3_18-24_9-default-2-2.3.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_9-preempt-2-2.3.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_9-preempt-2-2.3.x86_64", "product_id": "kernel-livepatch-5_3_18-24_9-preempt-2-2.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_9-default-2-2.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-2-2.3.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_9-default-2-2.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_9-default-2-2.3.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-2-2.3.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_9-default-2-2.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_9-default-2-2.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-2-2.3.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_9-default-2-2.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-2-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-2-2.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-2-2.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-2-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-2-2.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-2-2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-2-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-2-2.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-2-2.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:34:54Z", "details": "important" } ], "title": "CVE-2020-14331" } ] }
suse-su-2020:2631-1
Vulnerability from csaf_suse
Published
2020-09-14 16:34
Modified
2020-09-14 16:34
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 realtime kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).
- CVE-2020-14356: Fixed a null pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213).
- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).
- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).
- CVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).
The following non-security bugs were fixed:
- af_key: pfkey_dump needs parameter validation (git-fixes).
- agp/intel: Fix a memory leak on module initialisation failure (git-fixes).
- ACPI: kABI fixes for subsys exports (bsc#1174968).
- ACPI / LPSS: Resume BYT/CHT I2C controllers from resume_noirq (bsc#1174968).
- ACPI / LPSS: Use acpi_lpss_* instead of acpi_subsys_* functions for hibernate (bsc#1174968).
- ACPI: PM: Introduce 'poweroff' callbacks for ACPI PM domain and LPSS (bsc#1174968).
- ACPI: PM: Simplify and fix PM domain hibernation callbacks (bsc#1174968).
- ALSA: core: pcm_iec958: fix kernel-doc (bsc#1111666).
- ALSA: echoaduio: Drop superfluous volatile modifier (bsc#1111666).
- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (bsc#1111666).
- ALSA: hda: Add support for Loongson 7A1000 controller (bsc#1111666).
- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (bsc#1111666).
- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (bsc#1111666).
- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (bsc#1111666).
- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).
- ALSA: hda: fix snd_hda_codec_cleanup() documentation (bsc#1111666).
- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (bsc#1111666).
- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (bsc#1111666).
- ALSA: hda/realtek: Add model alc298-samsung-headphone (git-fixes).
- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (bsc#1111666).
- ALSA: hda/realtek - Add quirk for Lenovo Carbon X1 8th gen (bsc#1111666).
- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (bsc#1111666).
- ALSA: hda/realtek - Add quirk for MSI GL63 (bsc#1111666).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex Book (git-fixes).
- ALSA: hda/realtek - change to suitable link model for ASUS platform (bsc#1111666).
- ALSA: hda/realtek - Check headset type by unplug and resume (bsc#1111666).
- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (bsc#1111666).
- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (bsc#1111666).
- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (bsc#1111666).
- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (bsc#1111666).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (bsc#1111666).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (bsc#1111666).
- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (bsc#1111666).
- ALSA: hda/realtek: Fix add a 'ultra_low_power' function for intel reference board (alc256) (bsc#1111666).
- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (bsc#1111666).
- ALSA: hda/realtek - Fixed HP right speaker no sound (bsc#1111666).
- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (bsc#1111666).
- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (bsc#1111666).
- ALSA: hda/realtek - Fix unused variable warning (bsc#1111666).
- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (bsc#1111666).
- ALSA: hda - reverse the setting value in the micmute_led_set (bsc#1111666).
- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).
- ALSA: pci: delete repeated words in comments (bsc#1111666).
- ALSA: seq: oss: Serialize ioctls (bsc#1111666).
- ALSA: usb-audio: Add capture support for Saffire 6 (USB 1.1) (git-fixes).
- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (bsc#1111666).
- ALSA: usb-audio: add startech usb audio dock name (bsc#1111666).
- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (bsc#1111666).
- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (bsc#1111666).
- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (bsc#1111666).
- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (bsc#1111666).
- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).
- ALSA: usb-audio: fix spelling mistake 'buss' -> 'bus' (bsc#1111666).
- ALSA: usb-audio: ignore broken processing/extension unit (git-fixes).
- ALSA: usb-audio: Update documentation comment for MS2109 quirk (git-fixes).
- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (bsc#1111666).
- ALSA: usb/line6: remove 'defined but not used' warning (bsc#1111666).
- arm64: Add MIDR encoding for HiSilicon Taishan CPUs (bsc#1174547).
- arm64: Add MIDR encoding for NVIDIA CPUs (bsc#1174547).
- arm64: add sysfs vulnerability show for meltdown (bsc#1174547).
- arm64: Add sysfs vulnerability show for spectre-v1 (bsc#1174547).
- arm64: add sysfs vulnerability show for spectre-v2 (bsc#1174547).
- arm64: add sysfs vulnerability show for speculative store bypass (bsc#1174547).
- arm64: Advertise mitigation of Spectre-v2, or lack thereof (bsc#1174547).
- arm64: Always enable spectre-v2 vulnerability detection (bsc#1174547).
- arm64: Always enable ssb vulnerability detection (bsc#1174547).
- arm64: backtrace: Do not bother trying to unwind the userspace stack (bsc#1175397).
- arm64: capabilities: Add NVIDIA Denver CPU to bp_harden list (bsc#1174547).
- arm64: capabilities: Merge duplicate Cavium erratum entries (bsc#1174547).
- arm64: capabilities: Merge entries for ARM64_WORKAROUND_CLEAN_CACHE (bsc#1174547).
- arm64: cpufeature: Enable Qualcomm Falkor/Kryo errata 1003 (bsc#1175398).
- arm64: Do not mask out PTE_RDONLY in pte_same() (bsc#1175393).
- arm64: enable generic CPU vulnerabilites support (bsc#1174547).
- arm64: Ensure VM_WRITE|VM_SHARED ptes are clean by default (bsc#1175394).
- arm64: errata: Do not define type field twice for arm64_errata entries (bsc#1174547).
- arm64: errata: Update stale comment (bsc#1174547).
- arm64: Get rid of __smccc_workaround_1_hvc_* (bsc#1174547).
- arm64: kpti: Avoid rewriting early page tables when KASLR is enabled (bsc#1174547).
- arm64: kpti: Update arm64_kernel_use_ng_mappings() when forced on (bsc#1174547).
- arm64: kpti: Whitelist Cortex-A CPUs that do not implement the CSV3 field (bsc#1174547).
- arm64: kpti: Whitelist HiSilicon Taishan v110 CPUs (bsc#1174547).
- arm64: KVM: Avoid setting the upper 32 bits of VTCR_EL2 to 1 (bsc#1133021).
- arm64: KVM: Guests can skip __install_bp_hardening_cb()s HYP work (bsc#1174547).
- arm64: KVM: Use SMCCC_ARCH_WORKAROUND_1 for Falkor BP hardening (bsc#1174547).
- arm64: mm: Fix pte_mkclean, pte_mkdirty semantics (bsc#1175526).
- arm64: Provide a command line to disable spectre_v2 mitigation (bsc#1174547).
- arm64: Silence clang warning on mismatched value/register sizes (bsc#1175396).
- arm64/speculation: Support 'mitigations=' cmdline option (bsc#1174547).
- arm64: ssbs: Do not treat CPUs with SSBS as unaffected by SSB (bsc#1174547).
- arm64: ssbs: Fix context-switch when SSBS is present on all CPUs (bsc#1175669).
- arm64/sve: Fix wrong free for task->thread.sve_state (bsc#1175400).
- arm64: tlbflush: avoid writing RES0 bits (bsc#1175402).
- arm64: Use firmware to detect CPUs that are not affected by Spectre-v2 (bsc#1174547).
- ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17 (bsc#1133021).
- ARM: KVM: invalidate icache on guest exit for Cortex-A15 (bsc#1133021).
- ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15 (bsc#1133021).
- ASoC: hda/tegra: Set buffer alignment to 128 bytes (bsc#1111666).
- ASoC: intel: Fix memleak in sst_media_open (git-fixes).
- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).
- AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).
- AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).
- AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).
- ax88172a: fix ax88172a_unbind() failures (git-fixes).
- b43: Remove uninitialized_var() usage (git-fixes).
- block: Fix use-after-free in blkdev_get() (bsc#1174843).
- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (bsc#1111666).
- Bluetooth: Fix update of connection state in `hci_encrypt_cfm` (git-fixes).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (bsc#1111666).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (bsc#1111666).
- bonding: fix active-backup failover for current ARP slave (bsc#1174771).
- bonding: fix a potential double-unregister (git-fixes).
- bonding: show saner speed for broadcast mode (git-fixes).
- bpf: Fix map leak in HASH_OF_MAPS map (git-fixes).
- brcmfmac: keep SDIO watchdog running when console_interval is non-zero (bsc#1111666).
- brcmfmac: set state of hanger slot to FREE when flushing PSQ (bsc#1111666).
- brcmfmac: To fix Bss Info flag definition Bug (bsc#1111666).
- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).
- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).
- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).
- btrfs: fix block group leak when removing fails (bsc#1175149).
- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).
- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).
- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).
- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).
- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).
- btrfs: fix memory leaks after failure to lookup checksums during inode logging (bsc#1175550).
- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).
- btrfs: fix race between block group removal and block group creation (bsc#1175149).
- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).
- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).
- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).
- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).
- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).
- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).
- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).
- btrfs: Open code btrfs_write_and_wait_marked_extents (bsc#1175149).
- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).
- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).
- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).
- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).
- btrfs: Rename and export clear_btree_io_tree (bsc#1175149).
- btrfs: treat RWF_{,D}SYNC writes as sync for CRCs (bsc#1175493).
- bus: hisi_lpc: Add .remove method to avoid driver unbind crash (bsc#1174658).
- bus: hisi_lpc: Do not fail probe for unrecognised child devices (bsc#1174658).
- bus: hisi_lpc: Unregister logical PIO range to avoid potential use-after-free (bsc#1174658).
- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).
- cfg80211: check vendor command doit pointer before use (git-fixes).
- cifs: document and cleanup dfs mount (bsc#1144333 bsc#1172428).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1144333 bsc#1172428).
- cifs: fix double free error on share and prefix (bsc#1144333 bsc#1172428).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1144333 bsc#1172428).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1144333 bsc#1172428).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1144333 bsc#1172428).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1144333 bsc#1172428).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1144333 bsc#1172428).
- cifs: rename reconn_inval_dfs_target() (bsc#1144333 bsc#1172428).
- clk: at91: clk-generated: check best_rate against ranges (bsc#1111666).
- clk: clk-atlas6: fix return value check in atlas6_clk_init() (bsc#1111666).
- clk: iproc: round clock rate to the closest (bsc#1111666).
- clk: spear: Remove uninitialized_var() usage (git-fixes).
- clk: st: Remove uninitialized_var() usage (git-fixes).
- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1174549
- console: newport_con: fix an issue about leak related system resources (git-fixes).
- crypto: ccp - Fix use of merged scatterlists (git-fixes).
- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).
- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).
- crypto: rockchip - fix scatterlist nents error (git-fixes).
- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).
- crypto: talitos - check AES key size (git-fixes).
- crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK (git-fixes).
- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- dev: Defer free of skbs in flush_backlog (git-fixes).
- devres: keep both device name and resource name in pretty name (git-fixes).
- dlm: Fix kobject memleak (bsc#1175768).
- dlm: remove BUG() before panic() (bsc#1174844).
- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).
- Documentation/networking: Add net DIM documentation (bsc#1174852).
- dpaa2-eth: Fix passing zero to 'PTR_ERR' warning (bsc#1175403).
- dpaa2-eth: free already allocated channels on probe defer (bsc#1175404).
- dpaa2-eth: prevent array underflow in update_cls_rule() (bsc#1175405).
- dpaa_eth: add dropped frames to percpu ethtool stats (bsc#1174550).
- dpaa_eth: add newline in dev_err() msg (bsc#1174550).
- dpaa_eth: avoid timestamp read on error paths (bsc#1175406).
- dpaa_eth: change DMA device (bsc#1174550).
- dpaa_eth: cleanup skb_to_contig_fd() (bsc#1174550).
- dpaa_eth: defer probing after qbman (bsc#1174550).
- dpaa_eth: extend delays in ndo_stop (bsc#1174550).
- dpaa_eth: fix DMA mapping leak (bsc#1174550).
- dpaa_eth: Fix one possible memleak in dpaa_eth_probe (bsc#1174550).
- dpaa_eth: FMan erratum A050385 workaround (bsc#1174550).
- dpaa_eth: perform DMA unmapping before read (bsc#1175407).
- dpaa_eth: register a device link for the qman portal used (bsc#1174550).
- dpaa_eth: remove netdev_err() for user errors (bsc#1174550).
- dpaa_eth: remove redundant code (bsc#1174550).
- dpaa_eth: simplify variables used in dpaa_cleanup_tx_fd() (bsc#1174550).
- dpaa_eth: use a page to store the SGT (bsc#1174550).
- dpaa_eth: use fd information in dpaa_cleanup_tx_fd() (bsc#1174550).
- dpaa_eth: use only one buffer pool per interface (bsc#1174550).
- dpaa_eth: use page backed rx buffers (bsc#1174550).
- driver core: Avoid binding drivers to dead devices (git-fixes).
- Drivers: hv: vmbus: Fix virt_to_hvpfn() for X86_PAE (git-fixes).
- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127, bsc#1175128).
- drivers/perf: hisi: Fix typo in events attribute array (bsc#1175408).
- drivers/perf: hisi: Fixup one DDRC PMU register offset (bsc#1175410).
- drivers/perf: hisi: Fix wrong value for all counters enable (bsc#1175409).
- drm: Added orientation quirk for ASUS tablet model T103HAF (bsc#1111666).
- drm/amd/display: fix pow() crashing when given base 0 (git-fixes).
- drm/amdgpu: avoid dereferencing a NULL pointer (bsc#1111666).
- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (bsc#1111666).
- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (bsc#1113956)
- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).
- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1113956)
- drm/arm: fix unintentional integer overflow on left shift (git-fixes).
- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1113956)
- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).
- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1113956)
- drm/debugfs: fix plain echo to connector 'force' attribute (bsc#1111666).
- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).
- drm/etnaviv: fix ref count leak via pm_runtime_get_sync (bsc#1111666).
- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (bsc#1112178)
- drm: hold gem reference until object is no longer accessed (bsc#1113956)
- drm/imx: fix use after free (git-fixes).
- drm/imx: imx-ldb: Disable both channels for split mode in enc->disable() (git-fixes).
- drm/imx: tve: fix regulator_disable error path (git-fixes).
- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).
- drm/msm: ratelimit crtc event overflow error (bsc#1111666).
- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).
- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).
- drm/nouveau: fix multiple instances of reference count leaks (bsc#1111666).
- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).
- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).
- drm/radeon: disable AGP by default (bsc#1111666).
- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).
- drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync (bsc#1111666).
- drm/rockchip: fix VOP_WIN_GET macro (bsc#1175411).
- drm/ttm/nouveau: do not call tt destroy callback on alloc failure (bsc#1175232).
- drm/vmwgfx: Fix two list_for_each loop exit tests (bsc#1111666).
- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (bsc#1111666).
- efi/memreserve: deal with memreserve entries in unmapped memory (bsc#1174685).
- ext4: check journal inode extents more carefully (bsc#1173485).
- ext4: do not allow overlapping system zones (bsc#1173485).
- ext4: fix checking of directory entry validity for inline directories (bsc#1175771).
- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1174840).
- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).
- fat: do not allow to mount if the FAT length == 0 (bsc#1174845).
- fbdev: Detect integer underflow at 'struct fbcon_ops'->clear_margins. (bsc#1112178)
- firmware: google: check if size is valid when decoding VPD data (git-fixes).
- firmware: google: increment VPD key_len properly (git-fixes).
- fpga: dfl: fix bug in port reset handshake (git-fixes).
- fsl/fman: add API to get the device behind a fman port (bsc#1174550).
- fsl/fman: detect FMan erratum A050385 (bsc#1174550).
- fsl/fman: do not touch liodn base regs reserved on non-PAMU SoCs (bsc#1174550).
- fsl/fman: remove unused struct member (bsc#1174550).
- fuse: fix memleak in cuse_channel_open (bsc#1174926).
- fuse: fix missing unlock_page in fuse_writepage() (bsc#1174904).
- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175062).
- fuse: fix weird page warning (bsc#1175063).
- fuse: flush dirty data/metadata before non-truncate setattr (bsc#1175064).
- fuse: truncate pending writes on O_TRUNC (bsc#1175065).
- fuse: verify attributes (bsc#1175066).
- fuse: verify nlink (bsc#1175067).
- genetlink: remove genl_bind (networking-stable-20_07_17).
- go7007: add sanity checking for endpoints (git-fixes).
- gpu: host1x: debug: Fix multiple channels emitting messages simultaneously (bsc#1111666).
- HID: hiddev: fix mess in hiddev_open() (git-fixes).
- HISI LPC: Re-Add ACPI child enumeration support (bsc#1174658).
- HISI LPC: Stop using MFD APIs (bsc#1174658).
- hv_netvsc: do not use VF device if link is down (git-fixes).
- hv_netvsc: Fix error handling in netvsc_attach() (git-fixes).
- hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (git-fixes).
- hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (git-fixes).
- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (git-fixes).
- hv_netvsc: Remove 'unlikely' from netvsc_select_queue (git-fixes).
- i2c: rcar: slave: only send STOP event when we have been addressed (bsc#1111666).
- i40e: Fix crash during removing i40e driver (git-fixes).
- i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (git-fixes).
- ibmveth: Fix use of ibmveth in a bridge (bsc#1174387 ltc#187506).
- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).
- ibmvnic fix NULL tx_pools and rx_tools issue at do_reset (bsc#1175873 ltc#187922).
- include/linux/poison.h: remove obsolete comment (git fixes (poison)).
- Input: psmouse - add a newline when printing 'proto' by sysfs (git-fixes).
- Input: sentelic - fix error return when fsp_reg_write fails (bsc#1111666).
- integrity: remove redundant initialization of variable ret (git-fixes).
- io-mapping: indicate mapping failure (git-fixes).
- ip6_gre: fix null-ptr-deref in ip6gre_init_net() (git-fixes).
- ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() (networking-stable-20_06_28).
- ip6_tunnel: allow not to count pkts on tstats by passing dev as NULL (bsc#1175515).
- ip_tunnel: allow not to count pkts on tstats by setting skb's dev to NULL (bsc#1175515).
- ip_tunnel: Emit events for post-register MTU changes (git-fixes).
- ip_tunnel: fix use-after-free in ip_tunnel_lookup() (networking-stable-20_06_28).
- ip_tunnel: restore binding to ifaces with a large mtu (git-fixes).
- ipv4: fill fl4_icmp_{type,code} in ping_v4_sendmsg (networking-stable-20_07_17).
- ipv4: Silence suspicious RCU usage warning (git-fixes).
- ipv6: fix memory leaks on IPV6_ADDRFORM path (git-fixes).
- ipvlan: fix device features (git-fixes).
- ipvs: allow connection reuse for unconfirmed conntrack (git-fixes).
- ipvs: fix refcount usage for conns in ops mode (git-fixes).
- ipvs: fix the connection sync failed in some cases (bsc#1174699).
- irqchip/gic: Atomically update affinity (bsc#1111666).
- iwlegacy: Check the return value of pcie_capability_read_*() (bsc#1111666).
- jbd2: add the missing unlock_buffer() in the error path of jbd2_write_superblock() (bsc#1175772).
- kABI: genetlink: remove genl_bind (kabi).
- kernel/cpu_pm: Fix uninitted local in cpu_pm (git fixes (kernel/pm)).
- kernel/relay.c: fix memleak on destroy relay channel (git-fixes).
- kernfs: do not call fsnotify() with name without a parent (bsc#1175770).
- KVM: arm64: Ensure 'params' is initialised when looking up sys register (bsc#1133021).
- KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART (bsc#1133021).
- KVM: arm/arm64: Fix young bit from mmu notifier (bsc#1133021).
- KVM: arm/arm64: vgic: Do not rely on the wrong pending table (bsc#1133021).
- KVM: arm/arm64: vgic-its: Fix restoration of unmapped collections (bsc#1133021).
- KVM: arm: Fix DFSR setting for non-LPAE aarch32 guests (bsc#1133021).
- KVM: arm: Make inject_abt32() inject an external abort instead (bsc#1133021).
- kvm: Change offset in kvm_write_guest_offset_cached to unsigned (bsc#1133021).
- KVM: Check for a bad hva before dropping into the ghc slow path (bsc#1133021).
- KVM: PPC: Book3S PR: Remove uninitialized_var() usage (bsc#1065729).
- l2tp: remove skb_dst_set() from l2tp_xmit_skb() (networking-stable-20_07_17).
- leds: 88pm860x: fix use-after-free on unbind (git-fixes).
- leds: core: Flush scheduled work for system suspend (git-fixes).
- leds: da903x: fix use-after-free on unbind (git-fixes).
- leds: lm3533: fix use-after-free on unbind (git-fixes).
- leds: lm355x: avoid enum conversion warning (git-fixes).
- leds: wm831x-status: fix use-after-free on unbind (git-fixes).
- lib/dim: Fix -Wunused-const-variable warnings (bsc#1174852).
- lib: dimlib: fix help text typos (bsc#1174852).
- lib: logic_pio: Add logic_pio_unregister_range() (bsc#1174658).
- lib: logic_pio: Avoid possible overlap for unregistering regions (bsc#1174658).
- lib: logic_pio: Fix RCU usage (bsc#1174658).
- linux/dim: Add completions count to dim_sample (bsc#1174852).
- linux/dim: Fix overflow in dim calculation (bsc#1174852).
- linux/dim: Move implementation to .c files (bsc#1174852).
- linux/dim: Move logic to dim.h (bsc#1174852).
- linux/dim: Remove 'net' prefix from internal DIM members (bsc#1174852).
- linux/dim: Rename externally exposed macros (bsc#1174852).
- linux/dim: Rename externally used net_dim members (bsc#1174852).
- linux/dim: Rename net_dim_sample() to net_dim_update_sample() (bsc#1174852).
- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).
- llc: make sure applications use ARPHRD_ETHER (networking-stable-20_07_17).
- mac80211: mesh: Free ie data when leaving mesh (git-fixes).
- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).
- MAINTAINERS: add entry for Dynamic Interrupt Moderation (bsc#1174852).
- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (git-fixes).
- md/raid5: Fix Force reconstruct-write io stuck in degraded raid5 (git-fixes).
- media: budget-core: Improve exception handling in budget_register() (git-fixes).
- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).
- media: firewire: Using uninitialized values in node_probe() (git-fixes).
- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).
- media: vpss: clean up resources in init (git-fixes).
- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).
- mfd: dln2: Run event handler loop under spinlock (git-fixes).
- mfd: rk808: Fix RK818 ID template (bsc#1175412).
- mld: fix memory leak in ipv6_mc_destroy_dev() (networking-stable-20_06_28).
- mm: filemap: clear idle flag for writes (bsc#1175769).
- mm/migrate.c: add missing flush_dcache_page for non-mapped page migrate (git fixes (mm/migrate)).
- mm/mmu_notifier: use hlist_add_head_rcu() (git fixes (mm/mmu_notifiers)).
- mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() (git fixes (mm/compaction)).
- mm/rmap.c: do not reuse anon_vma if we just want a copy (git fixes (mm/rmap)).
- mm/shmem.c: cast the type of unmap_start to u64 (git fixes (mm/shmem)).
- mm, thp: fix defrag setting if newline is not used (git fixes (mm/thp)).
- mm/vunmap: add cond_resched() in vunmap_pmd_range (bsc#1175654 ltc#184617).
- mtd: spi-nor: Fix an error code in spi_nor_read_raw() (bsc#1175413).
- mtd: spi-nor: fix kernel-doc for spi_nor::info (bsc#1175414).
- mtd: spi-nor: fix kernel-doc for spi_nor::reg_proto (bsc#1175415).
- mtd: spi-nor: fix silent truncation in spi_nor_read_raw() (bsc#1175416).
- mwifiex: Prevent memory corruption handling keys (git-fixes).
- net: Added pointer check for dst->ops->neigh_lookup in dst_neigh_lookup_skb (git-fixes).
- net: bridge: enfore alignment for ethernet address (networking-stable-20_06_28).
- net: core: reduce recursion limit value (networking-stable-20_06_28).
- net: Do not clear the sock TX queue in sk_set_socket() (networking-stable-20_06_28).
- net: dsa: b53: check for timeout (git-fixes).
- net: ena: Add first_interrupt field to napi struct (bsc#1174852).
- net: ena: add reserved PCI device ID (bsc#1174852).
- net: ena: add support for reporting of packet drops (bsc#1174852).
- net: ena: add support for the rx offset feature (bsc#1174852).
- net: ena: add support for traffic mirroring (bsc#1174852).
- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).
- net: ena: allow setting the hash function without changing the key (bsc#1174852).
- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).
- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).
- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).
- net: ena: change num_queues to num_io_queues for clarity and consistency (bsc#1174852).
- net: ena: changes to RSS hash key allocation (bsc#1174852).
- net: ena: Change WARN_ON expression in ena_del_napi_in_range() (bsc#1174852).
- net: ena: clean up indentation issue (bsc#1174852).
- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).
- net: ena: cosmetic: code reorderings (bsc#1174852).
- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).
- net: ena: cosmetic: fix line break issues (bsc#1174852).
- net: ena: cosmetic: fix spacing issues (bsc#1174852).
- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).
- net: ena: cosmetic: minor code changes (bsc#1174852).
- net: ena: cosmetic: remove unnecessary code (bsc#1174852).
- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).
- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).
- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).
- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).
- net: ena: drop superfluous prototype (bsc#1174852).
- net: ena: enable support of rss hash key and function changes (bsc#1174852).
- net: ena: enable the interrupt_moderation in driver_supported_features (bsc#1174852).
- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).
- net: ena: ethtool: get_channels: use combined only (bsc#1174852).
- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).
- net: ena: ethtool: support set_channels callback (bsc#1174852).
- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).
- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).
- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).
- net: ena: fix incorrect setting of the number of msix vectors (bsc#1174852).
- net: ena: fix incorrect update of intr_delay_resolution (bsc#1174852).
- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).
- net: ena: fix update of interrupt moderation register (bsc#1174852).
- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).
- net: ena: implement XDP drop support (bsc#1174852).
- net: ena: Implement XDP_TX action (bsc#1174852).
- net: ena: make ethtool -l show correct max number of queues (bsc#1174852).
- net: ena: Make missed_tx stat incremental (bsc#1083548).
- net: ena: Make some functions static (bsc#1174852).
- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).
- net: ena: multiple queue creation related cleanups (bsc#1174852).
- net: ena: Prevent reset after device destruction (bsc#1083548).
- net: ena: reduce driver load time (bsc#1174852).
- net: ena: remove all old adaptive rx interrupt moderation code from ena_com (bsc#1174852).
- net: ena: remove code duplication in ena_com_update_nonadaptive_moderation_interval _*() (bsc#1174852).
- net: ena: remove code that does nothing (bsc#1174852).
- net: ena: remove ena_restore_ethtool_params() and relevant fields (bsc#1174852).
- net: ena: remove old adaptive interrupt moderation code from ena_netdev (bsc#1174852).
- net: ena: remove redundant print of number of queues (bsc#1174852).
- net: ena: remove set but not used variable 'hash_key' (bsc#1174852).
- net: ena: remove set but not used variable 'rx_ring' (bsc#1174852).
- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).
- net: ena: Select DIMLIB for ENA_ETHERNET (bsc#1174852).
- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).
- net: ena: support new LLQ acceleration mode (bsc#1174852).
- net: ena: switch to dim algorithm for rx adaptive interrupt moderation (bsc#1174852).
- net: ena: use explicit variable size for clarity (bsc#1174852).
- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).
- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1174852).
- net: ena: xdp: XDP_TX: fix memory leak (bsc#1174852).
- net: ethernet: broadcom: have drivers select DIMLIB as needed (bsc#1174852).
- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).
- net: fec: correct the error path for regulator disable in probe (git-fixes).
- netfilter: x_tables: add counters allocation wrapper (git-fixes).
- netfilter: x_tables: cap allocations at 512 mbyte (git-fixes).
- netfilter: x_tables: limit allocation requests for blob rule heads (git-fixes).
- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes).
- net: fix memleak in register_netdevice() (networking-stable-20_06_28).
- net: Fix the arp error in some cases (networking-stable-20_06_28).
- net: gre: recompute gre csum for sctp over gre tunnels (git-fixes).
- net: hns3: add autoneg and change speed support for fibre port (bsc#1174070).
- net: hns3: add support for FEC encoding control (bsc#1174070).
- net: hns3: add support for multiple media type (bsc#1174070).
- net: hns3: fix a not link up issue when fibre port supports autoneg (bsc#1174070).
- net: hns3: fix for FEC configuration (bsc#1174070).
- net: hns3: fix port capbility updating issue (bsc#1174070).
- net: hns3: fix port setting handle for fibre port (bsc#1174070).
- net: hns3: fix selftest fail issue for fibre port with autoneg on (bsc#1174070).
- net: hns3: restore the MAC autoneg state after reset (bsc#1174070).
- net: increment xmit_recursion level in dev_direct_xmit() (networking-stable-20_06_28).
- net: ip6_gre: Request headroom in __gre6_xmit() (git-fixes).
- net: lan78xx: add missing endpoint sanity check (git-fixes).
- net: lan78xx: fix transfer-buffer memory leak (git-fixes).
- net: make symbol 'flush_works' static (git-fixes).
- net: netsec: Fix signedness bug in netsec_probe() (bsc#1175417).
- net: netsec: initialize tx ring on ndo_open (bsc#1175418).
- net: phy: Check harder for errors in get_phy_id() (bsc#1111666).
- net: Set fput_needed iff FDPUT_FPUT is set (git-fixes).
- net: socionext: Fix a signedness bug in ave_probe() (bsc#1175419).
- net: socionext: replace napi_alloc_frag with the netdev variant on init (bsc#1175420).
- net: stmmac: dwmac1000: provide multicast filter fallback (git-fixes).
- net: udp: Fix wrong clean up for IS_UDPLITE macro (git-fixes).
- net: update net_dim documentation after rename (bsc#1174852).
- net: usb: ax88179_178a: fix packet alignment padding (networking-stable-20_06_28).
- net: usb: qmi_wwan: add support for Quectel EG95 LTE modem (networking-stable-20_07_17).
- netvsc: unshare skb in VF rx handler (git-fixes).
- net/xfrm: fix compress vs decompress serialization (bsc#1174298)
- net/xfrm/input: Protect queue with lock (bsc#1174299)
- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).
- NTB: Fix an error in get link status (git-fixes).
- ntb_netdev: fix sleep time mismatch (git-fixes).
- NTB: ntb_transport: Use scnprintf() for avoiding potential buffer overflow (git-fixes).
- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).
- nvme: fix possible deadlock when I/O is blocked (git-fixes).
- nvme-multipath: do not fall back to __nvme_find_path() for non-optimized paths (bsc#1172108).
- nvme-multipath: fix logic for non-optimized paths (bsc#1172108).
- nvme-multipath: round-robin: eliminate 'fallback' variable (bsc#1172108).
- nvme: multipath: round-robin: fix single non-optimized path case (bsc#1172108).
- ocfs2: add trimfs dlm lock resource (bsc#1175228).
- ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: change slot number type s16 to u16 (bsc#1175786).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: fix remounting needed after setfacl command (bsc#1173954).
- ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).
- ocfs2: fix value of OCFS2_INVALID_SLOT (bsc#1175767).
- ocfs2: load global_inode_alloc (bsc#1172963).
- ocfs2: load global_inode_alloc (bsc#1172963).
- omapfb: dss: Fix max fclk divider for omap36xx (bsc#1113956)
- openvswitch: Prevent kernel-infoleak in ovs_ct_put_key() (git-fixes).
- PCI/ASPM: Add missing newline in sysfs 'policy' (git-fixes).
- PCI: dwc: Move interrupt acking into the proper callback (bsc#1175666).
- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).
- PCI: Fix 'try' semantics of bus and slot reset (git-fixes).
- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).
- PCI: hv: Fix a timing issue which causes kdump to fail occasionally (bsc#1172871, bsc#1172872, git-fixes).
- PCI: Release IVRS table in AMD ACS quirk (git-fixes).
- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).
- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).
- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).
- pinctrl: single: fix function name in documentation (git-fixes).
- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).
- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).
- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).
- PM / CPU: replace raw_notifier with atomic_notifier (git fixes (kernel/pm)).
- PM / devfreq: rk3399_dmc: Add missing of_node_put() (bsc#1175668).
- PM / devfreq: rk3399_dmc: Disable devfreq-event device when fails.
- PM / devfreq: rk3399_dmc: Fix kernel oops when rockchip,pmu is absent (bsc#1175668).
- powerpc/64s: Do not init FSCR_DSCR in __init_FSCR() (bsc#1065729).
- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).
- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).
- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).
- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).
- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).
- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).
- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).
- powerpc/perf: Fix missing is_sier_aviable() during build (bsc#1065729).
- powerpc/pseries: Do not initiate shutdown when system is running on UPS (bsc#1175440 ltc#187574).
- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).
- powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU death (bsc#1085030 ltC#165630).
- powerpc/pseries: PCIE PHB reset (bsc#1174689).
- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).
- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).
- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).
- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).
- propagate_one(): mnt_set_mountpoint() needs mount_lock (bsc#1174841).
- pseries: Fix 64 bit logical memory block panic (bsc#1065729).
- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).
- rds: Prevent kernel-infoleak in rds_notify_queue_get() (git-fixes).
- regulator: gpio: Honor regulator-boot-on property (git-fixes).
- rocker: fix incorrect error handling in dma_rings_init (networking-stable-20_06_28).
- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).
- s390, dcssblk: kaddr and pfn can be NULL to ->direct_access() (bsc#1174873).
- sched: consistently handle layer3 header accesses in the presence of VLANs (networking-stable-20_07_17).
- scsi: dh: Add Fujitsu device to devinfo and dh lists (bsc#1174026).
- scsi: Fix trivial spelling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Address a set of sparse warnings (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change {RD,WRT}_REG_*() function names from upper case into lower case (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in header files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in source files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix issue with adapter's stopping state (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix login timeout (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix null pointer access during disconnect from subsystem (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix spelling of a variable name (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix warning after FC target reset (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush all sessions on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush I/O on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Initialize 'n' before using it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce noisy debug message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove an unused function (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove a superfluous cast (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: SAN congestion management implementation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use register names instead of register offsets (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for ha->fw_dumped (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1171688 bsc#1174003).
- scsi: smartpqi: add bay identifier (bsc#1172418).
- scsi: smartpqi: add gigabyte controller (bsc#1172418).
- scsi: smartpqi: add id support for SmartRAID 3152-8i (bsc#1172418).
- scsi: smartpqi: add inquiry timeouts (bsc#1172418).
- scsi: smartpqi: add module param for exposure order (bsc#1172418).
- scsi: smartpqi: add module param to hide vsep (bsc#1172418).
- scsi: smartpqi: add new pci ids (bsc#1172418).
- scsi: smartpqi: add pci ids for fiberhome controller (bsc#1172418).
- scsi: smartpqi: add RAID bypass counter (bsc#1172418).
- scsi: smartpqi: add sysfs entries (bsc#1172418).
- scsi: smartpqi: Align driver syntax with oob (bsc#1172418).
- scsi: smartpqi: avoid crashing kernel for controller issues (bsc#1172418).
- scsi: smartpqi: bump version (bsc#1172418).
- scsi: smartpqi: bump version (bsc#1172418).
- scsi: smartpqi: bump version to 1.2.16-010 (bsc#1172418).
- scsi: smartpqi: change TMF timeout from 60 to 30 seconds (bsc#1172418).
- scsi: smartpqi: correct hang when deleting 32 lds (bsc#1172418).
- scsi: smartpqi: correct REGNEWD return status (bsc#1172418).
- scsi: smartpqi: correct syntax issue (bsc#1172418).
- scsi: smartpqi: fix call trace in device discovery (bsc#1172418).
- scsi: smartpqi: fix controller lockup observed during force reboot (bsc#1172418).
- scsi: smartpqi: fix LUN reset when fw bkgnd thread is hung (bsc#1172418).
- scsi: smartpqi: fix problem with unique ID for physical device (bsc#1172418).
- scsi: smartpqi: identify physical devices without issuing INQUIRY (bsc#1172418).
- scsi: smartpqi: properly set both the DMA mask and the coherent DMA mask (bsc#1172418).
- scsi: smartpqi: remove unused manifest constants (bsc#1172418).
- scsi: smartpqi: Reporting unhandled SCSI errors (bsc#1172418).
- scsi: smartpqi: support device deletion via sysfs (bsc#1172418).
- scsi: smartpqi: update copyright (bsc#1172418).
- scsi: smartpqi: update logical volume size after expansion (bsc#1172418).
- scsi: smartpqi: Use scnprintf() for avoiding potential buffer overflow (bsc#1172418).
- scsi: storvsc: Correctly set number of hardware queues for IDE disk (git-fixes).
- scsi: target/iblock: fix WRITE SAME zeroing (bsc#1169790).
- sctp: Do not advertise IPv4 addresses if ipv6only is set on the socket (networking-stable-20_06_28).
- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).
- serial: 8250: change lock order in serial8250_do_startup() (git-fixes).
- serial: pl011: Do not leak amba_ports entry on driver register error (git-fixes).
- serial: pl011: Fix oops on -EPROBE_DEFER (git-fixes).
- soc: fsl: qbman: allow registering a device link for the portal user (bsc#1174550).
- soc: fsl: qbman_portals: add APIs to retrieve the probing status (bsc#1174550).
- spi: davinci: Remove uninitialized_var() usage (git-fixes).
- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).
- spi: nxp-fspi: Ensure width is respected in spi-mem operations (bsc#1175421).
- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1175422).
- spi: spi-mem: export spi_mem_default_supports_op() (bsc#1175421).
- spi: sun4i: update max transfer size reported (git-fixes).
- staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).
- staging: fsl-dpaa2: ethsw: Add missing netdevice check (bsc#1175423).
- staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).
- Staging: rtl8723bs: prevent buffer overflow in update_sta_support_rate() (git-fixes).
- staging/speakup: fix get_word non-space look-ahead (git-fixes).
- tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT (networking-stable-20_06_28).
- tcp: grow window for OOO packets only for SACK flows (networking-stable-20_06_28).
- tcp: make sure listeners do not initialize congestion-control state (networking-stable-20_07_17).
- tcp: md5: add missing memory barriers in tcp_md5_do_add()/tcp_md5_hash_key() (networking-stable-20_07_17).
- tcp: md5: do not send silly options in SYNCOOKIES (networking-stable-20_07_17).
- tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key() barriers (networking-stable-20_07_17).
- tracepoint: Mark __tracepoint_string's __used (git-fixes).
- tracing: Use trace_sched_process_free() instead of exit() for pid tracing (git-fixes).
- tty: serial: fsl_lpuart: add imx8qxp support (bsc#1175670).
- tty: serial: fsl_lpuart: free IDs allocated by IDA (bsc#1175670).
- USB: iowarrior: fix up report size handling for some devices (git-fixes).
- usbip: tools: fix module name in man page (git-fixes).
- USB: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).
- USB: serial: cp210x: re-enable auto-RTS on open (git-fixes).
- USB: serial: iuu_phoenix: fix led-activity helpers (git-fixes).
- usb: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).
- usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).
- VFS: Check rename_lock in lookup_fast() (bsc#1174734).
- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).
- video: pxafb: Fix the function used to balance a 'dma_alloc_coherent()' call (git-fixes).
- vlan: consolidate VLAN parsing code and limit max parsing depth (networking-stable-20_07_17).
- vmxnet3: use correct tcp hdr length when packet is encapsulated (bsc#1175199).
- vt_compat_ioctl(): clean up, use compat_ptr() properly (git-fixes).
- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).
- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (bsc#1111666).
- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (bsc#1111666).
- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (bsc#1111666).
- wl1251: fix always return 0 error (git-fixes).
- x86/hyper-v: Fix overflow bug in fill_gva_list() (git-fixes).
- x86/hyperv: Make hv_vcpu_is_preempted() visible (git-fixes).
- xfrm: check id proto in validate_tmpl() (git-fixes).
- xfrm: clean up xfrm protocol checks (git-fixes).
- xfrm_user: uncoditionally validate esn replay attribute struct (git-fixes).
- xfs: fix inode allocation block res calculation precedence (git-fixes).
- xfs: fix reflink quota reservation accounting error (git-fixes).
- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).
Patchnames
SUSE-2020-2631,SUSE-SLE-Module-RT-15-SP1-2020-2631
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP1 realtime kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).\n- CVE-2020-14356: Fixed a null pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213).\n- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).\n- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).\n- CVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).\n\nThe following non-security bugs were fixed:\n\n- af_key: pfkey_dump needs parameter validation (git-fixes).\n- agp/intel: Fix a memory leak on module initialisation failure (git-fixes).\n- ACPI: kABI fixes for subsys exports (bsc#1174968).\n- ACPI / LPSS: Resume BYT/CHT I2C controllers from resume_noirq (bsc#1174968).\n- ACPI / LPSS: Use acpi_lpss_* instead of acpi_subsys_* functions for hibernate (bsc#1174968).\n- ACPI: PM: Introduce \u0027poweroff\u0027 callbacks for ACPI PM domain and LPSS (bsc#1174968).\n- ACPI: PM: Simplify and fix PM domain hibernation callbacks (bsc#1174968).\n- ALSA: core: pcm_iec958: fix kernel-doc (bsc#1111666).\n- ALSA: echoaduio: Drop superfluous volatile modifier (bsc#1111666).\n- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (bsc#1111666).\n- ALSA: hda: Add support for Loongson 7A1000 controller (bsc#1111666).\n- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (bsc#1111666).\n- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (bsc#1111666).\n- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (bsc#1111666).\n- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).\n- ALSA: hda: fix snd_hda_codec_cleanup() documentation (bsc#1111666).\n- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (bsc#1111666).\n- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (bsc#1111666).\n- ALSA: hda/realtek: Add model alc298-samsung-headphone (git-fixes).\n- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for Lenovo Carbon X1 8th gen (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for MSI GL63 (bsc#1111666).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex Book (git-fixes).\n- ALSA: hda/realtek - change to suitable link model for ASUS platform (bsc#1111666).\n- ALSA: hda/realtek - Check headset type by unplug and resume (bsc#1111666).\n- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (bsc#1111666).\n- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (bsc#1111666).\n- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (bsc#1111666).\n- ALSA: hda/realtek: Fix add a \u0027ultra_low_power\u0027 function for intel reference board (alc256) (bsc#1111666).\n- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (bsc#1111666).\n- ALSA: hda/realtek - Fixed HP right speaker no sound (bsc#1111666).\n- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (bsc#1111666).\n- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (bsc#1111666).\n- ALSA: hda/realtek - Fix unused variable warning (bsc#1111666).\n- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (bsc#1111666).\n- ALSA: hda - reverse the setting value in the micmute_led_set (bsc#1111666).\n- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).\n- ALSA: pci: delete repeated words in comments (bsc#1111666).\n- ALSA: seq: oss: Serialize ioctls (bsc#1111666).\n- ALSA: usb-audio: Add capture support for Saffire 6 (USB 1.1) (git-fixes).\n- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (bsc#1111666).\n- ALSA: usb-audio: add startech usb audio dock name (bsc#1111666).\n- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (bsc#1111666).\n- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (bsc#1111666).\n- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (bsc#1111666).\n- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (bsc#1111666).\n- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).\n- ALSA: usb-audio: fix spelling mistake \u0027buss\u0027 -\u003e \u0027bus\u0027 (bsc#1111666).\n- ALSA: usb-audio: ignore broken processing/extension unit (git-fixes).\n- ALSA: usb-audio: Update documentation comment for MS2109 quirk (git-fixes).\n- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (bsc#1111666).\n- ALSA: usb/line6: remove \u0027defined but not used\u0027 warning (bsc#1111666).\n- arm64: Add MIDR encoding for HiSilicon Taishan CPUs (bsc#1174547).\n- arm64: Add MIDR encoding for NVIDIA CPUs (bsc#1174547).\n- arm64: add sysfs vulnerability show for meltdown (bsc#1174547).\n- arm64: Add sysfs vulnerability show for spectre-v1 (bsc#1174547).\n- arm64: add sysfs vulnerability show for spectre-v2 (bsc#1174547).\n- arm64: add sysfs vulnerability show for speculative store bypass (bsc#1174547).\n- arm64: Advertise mitigation of Spectre-v2, or lack thereof (bsc#1174547).\n- arm64: Always enable spectre-v2 vulnerability detection (bsc#1174547).\n- arm64: Always enable ssb vulnerability detection (bsc#1174547).\n- arm64: backtrace: Do not bother trying to unwind the userspace stack (bsc#1175397).\n- arm64: capabilities: Add NVIDIA Denver CPU to bp_harden list (bsc#1174547).\n- arm64: capabilities: Merge duplicate Cavium erratum entries (bsc#1174547).\n- arm64: capabilities: Merge entries for ARM64_WORKAROUND_CLEAN_CACHE (bsc#1174547).\n- arm64: cpufeature: Enable Qualcomm Falkor/Kryo errata 1003 (bsc#1175398).\n- arm64: Do not mask out PTE_RDONLY in pte_same() (bsc#1175393).\n- arm64: enable generic CPU vulnerabilites support (bsc#1174547).\n- arm64: Ensure VM_WRITE|VM_SHARED ptes are clean by default (bsc#1175394).\n- arm64: errata: Do not define type field twice for arm64_errata entries (bsc#1174547).\n- arm64: errata: Update stale comment (bsc#1174547).\n- arm64: Get rid of __smccc_workaround_1_hvc_* (bsc#1174547).\n- arm64: kpti: Avoid rewriting early page tables when KASLR is enabled (bsc#1174547).\n- arm64: kpti: Update arm64_kernel_use_ng_mappings() when forced on (bsc#1174547).\n- arm64: kpti: Whitelist Cortex-A CPUs that do not implement the CSV3 field (bsc#1174547).\n- arm64: kpti: Whitelist HiSilicon Taishan v110 CPUs (bsc#1174547).\n- arm64: KVM: Avoid setting the upper 32 bits of VTCR_EL2 to 1 (bsc#1133021).\n- arm64: KVM: Guests can skip __install_bp_hardening_cb()s HYP work (bsc#1174547).\n- arm64: KVM: Use SMCCC_ARCH_WORKAROUND_1 for Falkor BP hardening (bsc#1174547).\n- arm64: mm: Fix pte_mkclean, pte_mkdirty semantics (bsc#1175526).\n- arm64: Provide a command line to disable spectre_v2 mitigation (bsc#1174547).\n- arm64: Silence clang warning on mismatched value/register sizes (bsc#1175396).\n- arm64/speculation: Support \u0027mitigations=\u0027 cmdline option (bsc#1174547).\n- arm64: ssbs: Do not treat CPUs with SSBS as unaffected by SSB (bsc#1174547).\n- arm64: ssbs: Fix context-switch when SSBS is present on all CPUs (bsc#1175669).\n- arm64/sve: Fix wrong free for task-\u003ethread.sve_state (bsc#1175400).\n- arm64: tlbflush: avoid writing RES0 bits (bsc#1175402).\n- arm64: Use firmware to detect CPUs that are not affected by Spectre-v2 (bsc#1174547).\n- ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17 (bsc#1133021).\n- ARM: KVM: invalidate icache on guest exit for Cortex-A15 (bsc#1133021).\n- ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15 (bsc#1133021).\n- ASoC: hda/tegra: Set buffer alignment to 128 bytes (bsc#1111666).\n- ASoC: intel: Fix memleak in sst_media_open (git-fixes).\n- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).\n- AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).\n- AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).\n- AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).\n- ax88172a: fix ax88172a_unbind() failures (git-fixes).\n- b43: Remove uninitialized_var() usage (git-fixes).\n- block: Fix use-after-free in blkdev_get() (bsc#1174843).\n- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (bsc#1111666).\n- Bluetooth: Fix update of connection state in `hci_encrypt_cfm` (git-fixes).\n- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (bsc#1111666).\n- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (bsc#1111666).\n- bonding: fix active-backup failover for current ARP slave (bsc#1174771).\n- bonding: fix a potential double-unregister (git-fixes).\n- bonding: show saner speed for broadcast mode (git-fixes).\n- bpf: Fix map leak in HASH_OF_MAPS map (git-fixes).\n- brcmfmac: keep SDIO watchdog running when console_interval is non-zero (bsc#1111666).\n- brcmfmac: set state of hanger slot to FREE when flushing PSQ (bsc#1111666).\n- brcmfmac: To fix Bss Info flag definition Bug (bsc#1111666).\n- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).\n- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).\n- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).\n- btrfs: fix block group leak when removing fails (bsc#1175149).\n- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).\n- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).\n- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).\n- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).\n- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).\n- btrfs: fix memory leaks after failure to lookup checksums during inode logging (bsc#1175550).\n- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).\n- btrfs: fix race between block group removal and block group creation (bsc#1175149).\n- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).\n- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).\n- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).\n- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).\n- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).\n- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).\n- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).\n- btrfs: Open code btrfs_write_and_wait_marked_extents (bsc#1175149).\n- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).\n- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).\n- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).\n- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).\n- btrfs: Rename and export clear_btree_io_tree (bsc#1175149).\n- btrfs: treat RWF_{,D}SYNC writes as sync for CRCs (bsc#1175493).\n- bus: hisi_lpc: Add .remove method to avoid driver unbind crash (bsc#1174658).\n- bus: hisi_lpc: Do not fail probe for unrecognised child devices (bsc#1174658).\n- bus: hisi_lpc: Unregister logical PIO range to avoid potential use-after-free (bsc#1174658).\n- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).\n- cfg80211: check vendor command doit pointer before use (git-fixes).\n- cifs: document and cleanup dfs mount (bsc#1144333 bsc#1172428).\n- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1144333 bsc#1172428).\n- cifs: fix double free error on share and prefix (bsc#1144333 bsc#1172428).\n- cifs: handle empty list of targets in cifs_reconnect() (bsc#1144333 bsc#1172428).\n- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1144333 bsc#1172428).\n- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1144333 bsc#1172428).\n- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1144333 bsc#1172428).\n- cifs: reduce number of referral requests in DFS link lookups (bsc#1144333 bsc#1172428).\n- cifs: rename reconn_inval_dfs_target() (bsc#1144333 bsc#1172428).\n- clk: at91: clk-generated: check best_rate against ranges (bsc#1111666).\n- clk: clk-atlas6: fix return value check in atlas6_clk_init() (bsc#1111666).\n- clk: iproc: round clock rate to the closest (bsc#1111666).\n- clk: spear: Remove uninitialized_var() usage (git-fixes).\n- clk: st: Remove uninitialized_var() usage (git-fixes).\n- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1174549\n- console: newport_con: fix an issue about leak related system resources (git-fixes).\n- crypto: ccp - Fix use of merged scatterlists (git-fixes).\n- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).\n- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).\n- crypto: rockchip - fix scatterlist nents error (git-fixes).\n- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).\n- crypto: talitos - check AES key size (git-fixes).\n- crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK (git-fixes).\n- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- dev: Defer free of skbs in flush_backlog (git-fixes).\n- devres: keep both device name and resource name in pretty name (git-fixes).\n- dlm: Fix kobject memleak (bsc#1175768).\n- dlm: remove BUG() before panic() (bsc#1174844).\n- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).\n- Documentation/networking: Add net DIM documentation (bsc#1174852).\n- dpaa2-eth: Fix passing zero to \u0027PTR_ERR\u0027 warning (bsc#1175403).\n- dpaa2-eth: free already allocated channels on probe defer (bsc#1175404).\n- dpaa2-eth: prevent array underflow in update_cls_rule() (bsc#1175405).\n- dpaa_eth: add dropped frames to percpu ethtool stats (bsc#1174550).\n- dpaa_eth: add newline in dev_err() msg (bsc#1174550).\n- dpaa_eth: avoid timestamp read on error paths (bsc#1175406).\n- dpaa_eth: change DMA device (bsc#1174550).\n- dpaa_eth: cleanup skb_to_contig_fd() (bsc#1174550).\n- dpaa_eth: defer probing after qbman (bsc#1174550).\n- dpaa_eth: extend delays in ndo_stop (bsc#1174550).\n- dpaa_eth: fix DMA mapping leak (bsc#1174550).\n- dpaa_eth: Fix one possible memleak in dpaa_eth_probe (bsc#1174550).\n- dpaa_eth: FMan erratum A050385 workaround (bsc#1174550).\n- dpaa_eth: perform DMA unmapping before read (bsc#1175407).\n- dpaa_eth: register a device link for the qman portal used (bsc#1174550).\n- dpaa_eth: remove netdev_err() for user errors (bsc#1174550).\n- dpaa_eth: remove redundant code (bsc#1174550).\n- dpaa_eth: simplify variables used in dpaa_cleanup_tx_fd() (bsc#1174550).\n- dpaa_eth: use a page to store the SGT (bsc#1174550).\n- dpaa_eth: use fd information in dpaa_cleanup_tx_fd() (bsc#1174550).\n- dpaa_eth: use only one buffer pool per interface (bsc#1174550).\n- dpaa_eth: use page backed rx buffers (bsc#1174550).\n- driver core: Avoid binding drivers to dead devices (git-fixes).\n- Drivers: hv: vmbus: Fix virt_to_hvpfn() for X86_PAE (git-fixes).\n- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127, bsc#1175128).\n- drivers/perf: hisi: Fix typo in events attribute array (bsc#1175408).\n- drivers/perf: hisi: Fixup one DDRC PMU register offset (bsc#1175410).\n- drivers/perf: hisi: Fix wrong value for all counters enable (bsc#1175409).\n- drm: Added orientation quirk for ASUS tablet model T103HAF (bsc#1111666).\n- drm/amd/display: fix pow() crashing when given base 0 (git-fixes).\n- drm/amdgpu: avoid dereferencing a NULL pointer (bsc#1111666).\n- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (bsc#1111666).\n- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (bsc#1113956)\n- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).\n- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1113956)\n- drm/arm: fix unintentional integer overflow on left shift (git-fixes).\n- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1113956)\n- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).\n- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1113956)\n- drm/debugfs: fix plain echo to connector \u0027force\u0027 attribute (bsc#1111666).\n- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).\n- drm/etnaviv: fix ref count leak via pm_runtime_get_sync (bsc#1111666).\n- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (bsc#1112178)\n- drm: hold gem reference until object is no longer accessed (bsc#1113956)\n- drm/imx: fix use after free (git-fixes).\n- drm/imx: imx-ldb: Disable both channels for split mode in enc-\u003edisable() (git-fixes).\n- drm/imx: tve: fix regulator_disable error path (git-fixes).\n- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).\n- drm/msm: ratelimit crtc event overflow error (bsc#1111666).\n- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).\n- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).\n- drm/nouveau: fix multiple instances of reference count leaks (bsc#1111666).\n- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).\n- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).\n- drm/radeon: disable AGP by default (bsc#1111666).\n- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).\n- drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync (bsc#1111666).\n- drm/rockchip: fix VOP_WIN_GET macro (bsc#1175411).\n- drm/ttm/nouveau: do not call tt destroy callback on alloc failure (bsc#1175232).\n- drm/vmwgfx: Fix two list_for_each loop exit tests (bsc#1111666).\n- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (bsc#1111666).\n- efi/memreserve: deal with memreserve entries in unmapped memory (bsc#1174685).\n- ext4: check journal inode extents more carefully (bsc#1173485).\n- ext4: do not allow overlapping system zones (bsc#1173485).\n- ext4: fix checking of directory entry validity for inline directories (bsc#1175771).\n- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1174840).\n- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).\n- fat: do not allow to mount if the FAT length == 0 (bsc#1174845).\n- fbdev: Detect integer underflow at \u0027struct fbcon_ops\u0027-\u003eclear_margins. (bsc#1112178)\n- firmware: google: check if size is valid when decoding VPD data (git-fixes).\n- firmware: google: increment VPD key_len properly (git-fixes).\n- fpga: dfl: fix bug in port reset handshake (git-fixes).\n- fsl/fman: add API to get the device behind a fman port (bsc#1174550).\n- fsl/fman: detect FMan erratum A050385 (bsc#1174550).\n- fsl/fman: do not touch liodn base regs reserved on non-PAMU SoCs (bsc#1174550).\n- fsl/fman: remove unused struct member (bsc#1174550).\n- fuse: fix memleak in cuse_channel_open (bsc#1174926).\n- fuse: fix missing unlock_page in fuse_writepage() (bsc#1174904).\n- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175062).\n- fuse: fix weird page warning (bsc#1175063).\n- fuse: flush dirty data/metadata before non-truncate setattr (bsc#1175064).\n- fuse: truncate pending writes on O_TRUNC (bsc#1175065).\n- fuse: verify attributes (bsc#1175066).\n- fuse: verify nlink (bsc#1175067).\n- genetlink: remove genl_bind (networking-stable-20_07_17).\n- go7007: add sanity checking for endpoints (git-fixes).\n- gpu: host1x: debug: Fix multiple channels emitting messages simultaneously (bsc#1111666).\n- HID: hiddev: fix mess in hiddev_open() (git-fixes).\n- HISI LPC: Re-Add ACPI child enumeration support (bsc#1174658).\n- HISI LPC: Stop using MFD APIs (bsc#1174658).\n- hv_netvsc: do not use VF device if link is down (git-fixes).\n- hv_netvsc: Fix error handling in netvsc_attach() (git-fixes).\n- hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (git-fixes).\n- hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (git-fixes).\n- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (git-fixes).\n- hv_netvsc: Remove \u0027unlikely\u0027 from netvsc_select_queue (git-fixes).\n- i2c: rcar: slave: only send STOP event when we have been addressed (bsc#1111666).\n- i40e: Fix crash during removing i40e driver (git-fixes).\n- i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (git-fixes).\n- ibmveth: Fix use of ibmveth in a bridge (bsc#1174387 ltc#187506).\n- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).\n- ibmvnic fix NULL tx_pools and rx_tools issue at do_reset (bsc#1175873 ltc#187922).\n- include/linux/poison.h: remove obsolete comment (git fixes (poison)).\n- Input: psmouse - add a newline when printing \u0027proto\u0027 by sysfs (git-fixes).\n- Input: sentelic - fix error return when fsp_reg_write fails (bsc#1111666).\n- integrity: remove redundant initialization of variable ret (git-fixes).\n- io-mapping: indicate mapping failure (git-fixes).\n- ip6_gre: fix null-ptr-deref in ip6gre_init_net() (git-fixes).\n- ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() (networking-stable-20_06_28).\n- ip6_tunnel: allow not to count pkts on tstats by passing dev as NULL (bsc#1175515).\n- ip_tunnel: allow not to count pkts on tstats by setting skb\u0027s dev to NULL (bsc#1175515).\n- ip_tunnel: Emit events for post-register MTU changes (git-fixes).\n- ip_tunnel: fix use-after-free in ip_tunnel_lookup() (networking-stable-20_06_28).\n- ip_tunnel: restore binding to ifaces with a large mtu (git-fixes).\n- ipv4: fill fl4_icmp_{type,code} in ping_v4_sendmsg (networking-stable-20_07_17).\n- ipv4: Silence suspicious RCU usage warning (git-fixes).\n- ipv6: fix memory leaks on IPV6_ADDRFORM path (git-fixes).\n- ipvlan: fix device features (git-fixes).\n- ipvs: allow connection reuse for unconfirmed conntrack (git-fixes).\n- ipvs: fix refcount usage for conns in ops mode (git-fixes).\n- ipvs: fix the connection sync failed in some cases (bsc#1174699).\n- irqchip/gic: Atomically update affinity (bsc#1111666).\n- iwlegacy: Check the return value of pcie_capability_read_*() (bsc#1111666).\n- jbd2: add the missing unlock_buffer() in the error path of jbd2_write_superblock() (bsc#1175772).\n- kABI: genetlink: remove genl_bind (kabi).\n- kernel/cpu_pm: Fix uninitted local in cpu_pm (git fixes (kernel/pm)).\n- kernel/relay.c: fix memleak on destroy relay channel (git-fixes).\n- kernfs: do not call fsnotify() with name without a parent (bsc#1175770).\n- KVM: arm64: Ensure \u0027params\u0027 is initialised when looking up sys register (bsc#1133021).\n- KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART (bsc#1133021).\n- KVM: arm/arm64: Fix young bit from mmu notifier (bsc#1133021).\n- KVM: arm/arm64: vgic: Do not rely on the wrong pending table (bsc#1133021).\n- KVM: arm/arm64: vgic-its: Fix restoration of unmapped collections (bsc#1133021).\n- KVM: arm: Fix DFSR setting for non-LPAE aarch32 guests (bsc#1133021).\n- KVM: arm: Make inject_abt32() inject an external abort instead (bsc#1133021).\n- kvm: Change offset in kvm_write_guest_offset_cached to unsigned (bsc#1133021).\n- KVM: Check for a bad hva before dropping into the ghc slow path (bsc#1133021).\n- KVM: PPC: Book3S PR: Remove uninitialized_var() usage (bsc#1065729).\n- l2tp: remove skb_dst_set() from l2tp_xmit_skb() (networking-stable-20_07_17).\n- leds: 88pm860x: fix use-after-free on unbind (git-fixes).\n- leds: core: Flush scheduled work for system suspend (git-fixes).\n- leds: da903x: fix use-after-free on unbind (git-fixes).\n- leds: lm3533: fix use-after-free on unbind (git-fixes).\n- leds: lm355x: avoid enum conversion warning (git-fixes).\n- leds: wm831x-status: fix use-after-free on unbind (git-fixes).\n- lib/dim: Fix -Wunused-const-variable warnings (bsc#1174852).\n- lib: dimlib: fix help text typos (bsc#1174852).\n- lib: logic_pio: Add logic_pio_unregister_range() (bsc#1174658).\n- lib: logic_pio: Avoid possible overlap for unregistering regions (bsc#1174658).\n- lib: logic_pio: Fix RCU usage (bsc#1174658).\n- linux/dim: Add completions count to dim_sample (bsc#1174852).\n- linux/dim: Fix overflow in dim calculation (bsc#1174852).\n- linux/dim: Move implementation to .c files (bsc#1174852).\n- linux/dim: Move logic to dim.h (bsc#1174852).\n- linux/dim: Remove \u0027net\u0027 prefix from internal DIM members (bsc#1174852).\n- linux/dim: Rename externally exposed macros (bsc#1174852).\n- linux/dim: Rename externally used net_dim members (bsc#1174852).\n- linux/dim: Rename net_dim_sample() to net_dim_update_sample() (bsc#1174852).\n- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).\n- llc: make sure applications use ARPHRD_ETHER (networking-stable-20_07_17).\n- mac80211: mesh: Free ie data when leaving mesh (git-fixes).\n- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).\n- MAINTAINERS: add entry for Dynamic Interrupt Moderation (bsc#1174852).\n- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (git-fixes).\n- md/raid5: Fix Force reconstruct-write io stuck in degraded raid5 (git-fixes).\n- media: budget-core: Improve exception handling in budget_register() (git-fixes).\n- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).\n- media: firewire: Using uninitialized values in node_probe() (git-fixes).\n- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).\n- media: vpss: clean up resources in init (git-fixes).\n- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).\n- mfd: dln2: Run event handler loop under spinlock (git-fixes).\n- mfd: rk808: Fix RK818 ID template (bsc#1175412).\n- mld: fix memory leak in ipv6_mc_destroy_dev() (networking-stable-20_06_28).\n- mm: filemap: clear idle flag for writes (bsc#1175769).\n- mm/migrate.c: add missing flush_dcache_page for non-mapped page migrate (git fixes (mm/migrate)).\n- mm/mmu_notifier: use hlist_add_head_rcu() (git fixes (mm/mmu_notifiers)).\n- mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() (git fixes (mm/compaction)).\n- mm/rmap.c: do not reuse anon_vma if we just want a copy (git fixes (mm/rmap)).\n- mm/shmem.c: cast the type of unmap_start to u64 (git fixes (mm/shmem)).\n- mm, thp: fix defrag setting if newline is not used (git fixes (mm/thp)).\n- mm/vunmap: add cond_resched() in vunmap_pmd_range (bsc#1175654 ltc#184617).\n- mtd: spi-nor: Fix an error code in spi_nor_read_raw() (bsc#1175413).\n- mtd: spi-nor: fix kernel-doc for spi_nor::info (bsc#1175414).\n- mtd: spi-nor: fix kernel-doc for spi_nor::reg_proto (bsc#1175415).\n- mtd: spi-nor: fix silent truncation in spi_nor_read_raw() (bsc#1175416).\n- mwifiex: Prevent memory corruption handling keys (git-fixes).\n- net: Added pointer check for dst-\u003eops-\u003eneigh_lookup in dst_neigh_lookup_skb (git-fixes).\n- net: bridge: enfore alignment for ethernet address (networking-stable-20_06_28).\n- net: core: reduce recursion limit value (networking-stable-20_06_28).\n- net: Do not clear the sock TX queue in sk_set_socket() (networking-stable-20_06_28).\n- net: dsa: b53: check for timeout (git-fixes).\n- net: ena: Add first_interrupt field to napi struct (bsc#1174852).\n- net: ena: add reserved PCI device ID (bsc#1174852).\n- net: ena: add support for reporting of packet drops (bsc#1174852).\n- net: ena: add support for the rx offset feature (bsc#1174852).\n- net: ena: add support for traffic mirroring (bsc#1174852).\n- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).\n- net: ena: allow setting the hash function without changing the key (bsc#1174852).\n- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).\n- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).\n- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).\n- net: ena: change num_queues to num_io_queues for clarity and consistency (bsc#1174852).\n- net: ena: changes to RSS hash key allocation (bsc#1174852).\n- net: ena: Change WARN_ON expression in ena_del_napi_in_range() (bsc#1174852).\n- net: ena: clean up indentation issue (bsc#1174852).\n- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).\n- net: ena: cosmetic: code reorderings (bsc#1174852).\n- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).\n- net: ena: cosmetic: fix line break issues (bsc#1174852).\n- net: ena: cosmetic: fix spacing issues (bsc#1174852).\n- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).\n- net: ena: cosmetic: minor code changes (bsc#1174852).\n- net: ena: cosmetic: remove unnecessary code (bsc#1174852).\n- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).\n- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).\n- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).\n- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).\n- net: ena: drop superfluous prototype (bsc#1174852).\n- net: ena: enable support of rss hash key and function changes (bsc#1174852).\n- net: ena: enable the interrupt_moderation in driver_supported_features (bsc#1174852).\n- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).\n- net: ena: ethtool: get_channels: use combined only (bsc#1174852).\n- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).\n- net: ena: ethtool: support set_channels callback (bsc#1174852).\n- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).\n- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).\n- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).\n- net: ena: fix incorrect setting of the number of msix vectors (bsc#1174852).\n- net: ena: fix incorrect update of intr_delay_resolution (bsc#1174852).\n- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).\n- net: ena: fix update of interrupt moderation register (bsc#1174852).\n- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).\n- net: ena: implement XDP drop support (bsc#1174852).\n- net: ena: Implement XDP_TX action (bsc#1174852).\n- net: ena: make ethtool -l show correct max number of queues (bsc#1174852).\n- net: ena: Make missed_tx stat incremental (bsc#1083548).\n- net: ena: Make some functions static (bsc#1174852).\n- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).\n- net: ena: multiple queue creation related cleanups (bsc#1174852).\n- net: ena: Prevent reset after device destruction (bsc#1083548).\n- net: ena: reduce driver load time (bsc#1174852).\n- net: ena: remove all old adaptive rx interrupt moderation code from ena_com (bsc#1174852).\n- net: ena: remove code duplication in ena_com_update_nonadaptive_moderation_interval _*() (bsc#1174852).\n- net: ena: remove code that does nothing (bsc#1174852).\n- net: ena: remove ena_restore_ethtool_params() and relevant fields (bsc#1174852).\n- net: ena: remove old adaptive interrupt moderation code from ena_netdev (bsc#1174852).\n- net: ena: remove redundant print of number of queues (bsc#1174852).\n- net: ena: remove set but not used variable \u0027hash_key\u0027 (bsc#1174852).\n- net: ena: remove set but not used variable \u0027rx_ring\u0027 (bsc#1174852).\n- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).\n- net: ena: Select DIMLIB for ENA_ETHERNET (bsc#1174852).\n- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).\n- net: ena: support new LLQ acceleration mode (bsc#1174852).\n- net: ena: switch to dim algorithm for rx adaptive interrupt moderation (bsc#1174852).\n- net: ena: use explicit variable size for clarity (bsc#1174852).\n- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).\n- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1174852).\n- net: ena: xdp: XDP_TX: fix memory leak (bsc#1174852).\n- net: ethernet: broadcom: have drivers select DIMLIB as needed (bsc#1174852).\n- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).\n- net: fec: correct the error path for regulator disable in probe (git-fixes).\n- netfilter: x_tables: add counters allocation wrapper (git-fixes).\n- netfilter: x_tables: cap allocations at 512 mbyte (git-fixes).\n- netfilter: x_tables: limit allocation requests for blob rule heads (git-fixes).\n- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes).\n- net: fix memleak in register_netdevice() (networking-stable-20_06_28).\n- net: Fix the arp error in some cases (networking-stable-20_06_28).\n- net: gre: recompute gre csum for sctp over gre tunnels (git-fixes).\n- net: hns3: add autoneg and change speed support for fibre port (bsc#1174070).\n- net: hns3: add support for FEC encoding control (bsc#1174070).\n- net: hns3: add support for multiple media type (bsc#1174070).\n- net: hns3: fix a not link up issue when fibre port supports autoneg (bsc#1174070).\n- net: hns3: fix for FEC configuration (bsc#1174070).\n- net: hns3: fix port capbility updating issue (bsc#1174070).\n- net: hns3: fix port setting handle for fibre port (bsc#1174070).\n- net: hns3: fix selftest fail issue for fibre port with autoneg on (bsc#1174070).\n- net: hns3: restore the MAC autoneg state after reset (bsc#1174070).\n- net: increment xmit_recursion level in dev_direct_xmit() (networking-stable-20_06_28).\n- net: ip6_gre: Request headroom in __gre6_xmit() (git-fixes).\n- net: lan78xx: add missing endpoint sanity check (git-fixes).\n- net: lan78xx: fix transfer-buffer memory leak (git-fixes).\n- net: make symbol \u0027flush_works\u0027 static (git-fixes).\n- net: netsec: Fix signedness bug in netsec_probe() (bsc#1175417).\n- net: netsec: initialize tx ring on ndo_open (bsc#1175418).\n- net: phy: Check harder for errors in get_phy_id() (bsc#1111666).\n- net: Set fput_needed iff FDPUT_FPUT is set (git-fixes).\n- net: socionext: Fix a signedness bug in ave_probe() (bsc#1175419).\n- net: socionext: replace napi_alloc_frag with the netdev variant on init (bsc#1175420).\n- net: stmmac: dwmac1000: provide multicast filter fallback (git-fixes).\n- net: udp: Fix wrong clean up for IS_UDPLITE macro (git-fixes).\n- net: update net_dim documentation after rename (bsc#1174852).\n- net: usb: ax88179_178a: fix packet alignment padding (networking-stable-20_06_28).\n- net: usb: qmi_wwan: add support for Quectel EG95 LTE modem (networking-stable-20_07_17).\n- netvsc: unshare skb in VF rx handler (git-fixes).\n- net/xfrm: fix compress vs decompress serialization (bsc#1174298)\n- net/xfrm/input: Protect queue with lock (bsc#1174299)\n- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).\n- NTB: Fix an error in get link status (git-fixes).\n- ntb_netdev: fix sleep time mismatch (git-fixes).\n- NTB: ntb_transport: Use scnprintf() for avoiding potential buffer overflow (git-fixes).\n- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme-multipath: do not fall back to __nvme_find_path() for non-optimized paths (bsc#1172108).\n- nvme-multipath: fix logic for non-optimized paths (bsc#1172108).\n- nvme-multipath: round-robin: eliminate \u0027fallback\u0027 variable (bsc#1172108).\n- nvme: multipath: round-robin: fix single non-optimized path case (bsc#1172108).\n- ocfs2: add trimfs dlm lock resource (bsc#1175228).\n- ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).\n- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n- ocfs2: change slot number type s16 to u16 (bsc#1175786).\n- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n- ocfs2: fix remounting needed after setfacl command (bsc#1173954).\n- ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).\n- ocfs2: fix value of OCFS2_INVALID_SLOT (bsc#1175767).\n- ocfs2: load global_inode_alloc (bsc#1172963).\n- ocfs2: load global_inode_alloc (bsc#1172963).\n- omapfb: dss: Fix max fclk divider for omap36xx (bsc#1113956)\n- openvswitch: Prevent kernel-infoleak in ovs_ct_put_key() (git-fixes).\n- PCI/ASPM: Add missing newline in sysfs \u0027policy\u0027 (git-fixes).\n- PCI: dwc: Move interrupt acking into the proper callback (bsc#1175666).\n- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).\n- PCI: Fix \u0027try\u0027 semantics of bus and slot reset (git-fixes).\n- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).\n- PCI: hv: Fix a timing issue which causes kdump to fail occasionally (bsc#1172871, bsc#1172872, git-fixes).\n- PCI: Release IVRS table in AMD ACS quirk (git-fixes).\n- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).\n- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).\n- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).\n- pinctrl: single: fix function name in documentation (git-fixes).\n- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).\n- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).\n- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).\n- PM / CPU: replace raw_notifier with atomic_notifier (git fixes (kernel/pm)).\n- PM / devfreq: rk3399_dmc: Add missing of_node_put() (bsc#1175668).\n- PM / devfreq: rk3399_dmc: Disable devfreq-event device when fails.\n- PM / devfreq: rk3399_dmc: Fix kernel oops when rockchip,pmu is absent (bsc#1175668).\n- powerpc/64s: Do not init FSCR_DSCR in __init_FSCR() (bsc#1065729).\n- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).\n- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).\n- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).\n- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).\n- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).\n- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).\n- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).\n- powerpc/perf: Fix missing is_sier_aviable() during build (bsc#1065729).\n- powerpc/pseries: Do not initiate shutdown when system is running on UPS (bsc#1175440 ltc#187574).\n- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).\n- powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU death (bsc#1085030 ltC#165630).\n- powerpc/pseries: PCIE PHB reset (bsc#1174689).\n- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).\n- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).\n- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).\n- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).\n- propagate_one(): mnt_set_mountpoint() needs mount_lock (bsc#1174841).\n- pseries: Fix 64 bit logical memory block panic (bsc#1065729).\n- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).\n- rds: Prevent kernel-infoleak in rds_notify_queue_get() (git-fixes).\n- regulator: gpio: Honor regulator-boot-on property (git-fixes).\n- rocker: fix incorrect error handling in dma_rings_init (networking-stable-20_06_28).\n- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).\n- s390, dcssblk: kaddr and pfn can be NULL to -\u003edirect_access() (bsc#1174873).\n- sched: consistently handle layer3 header accesses in the presence of VLANs (networking-stable-20_07_17).\n- scsi: dh: Add Fujitsu device to devinfo and dh lists (bsc#1174026).\n- scsi: Fix trivial spelling (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Address a set of sparse warnings (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Change {RD,WRT}_REG_*() function names from upper case into lower case (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix endianness annotations in header files (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix endianness annotations in source files (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix issue with adapter\u0027s stopping state (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix login timeout (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix null pointer access during disconnect from subsystem (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix spelling of a variable name (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix warning after FC target reset (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Flush all sessions on zone disable (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Flush I/O on zone disable (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Initialize \u0027n\u0027 before using it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Reduce noisy debug message (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove an unused function (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove a superfluous cast (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: SAN congestion management implementation (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use register names instead of register offsets (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use true, false for ha-\u003efw_dumped (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1171688 bsc#1174003).\n- scsi: smartpqi: add bay identifier (bsc#1172418).\n- scsi: smartpqi: add gigabyte controller (bsc#1172418).\n- scsi: smartpqi: add id support for SmartRAID 3152-8i (bsc#1172418).\n- scsi: smartpqi: add inquiry timeouts (bsc#1172418).\n- scsi: smartpqi: add module param for exposure order (bsc#1172418).\n- scsi: smartpqi: add module param to hide vsep (bsc#1172418).\n- scsi: smartpqi: add new pci ids (bsc#1172418).\n- scsi: smartpqi: add pci ids for fiberhome controller (bsc#1172418).\n- scsi: smartpqi: add RAID bypass counter (bsc#1172418).\n- scsi: smartpqi: add sysfs entries (bsc#1172418).\n- scsi: smartpqi: Align driver syntax with oob (bsc#1172418).\n- scsi: smartpqi: avoid crashing kernel for controller issues (bsc#1172418).\n- scsi: smartpqi: bump version (bsc#1172418).\n- scsi: smartpqi: bump version (bsc#1172418).\n- scsi: smartpqi: bump version to 1.2.16-010 (bsc#1172418).\n- scsi: smartpqi: change TMF timeout from 60 to 30 seconds (bsc#1172418).\n- scsi: smartpqi: correct hang when deleting 32 lds (bsc#1172418).\n- scsi: smartpqi: correct REGNEWD return status (bsc#1172418).\n- scsi: smartpqi: correct syntax issue (bsc#1172418).\n- scsi: smartpqi: fix call trace in device discovery (bsc#1172418).\n- scsi: smartpqi: fix controller lockup observed during force reboot (bsc#1172418).\n- scsi: smartpqi: fix LUN reset when fw bkgnd thread is hung (bsc#1172418).\n- scsi: smartpqi: fix problem with unique ID for physical device (bsc#1172418).\n- scsi: smartpqi: identify physical devices without issuing INQUIRY (bsc#1172418).\n- scsi: smartpqi: properly set both the DMA mask and the coherent DMA mask (bsc#1172418).\n- scsi: smartpqi: remove unused manifest constants (bsc#1172418).\n- scsi: smartpqi: Reporting unhandled SCSI errors (bsc#1172418).\n- scsi: smartpqi: support device deletion via sysfs (bsc#1172418).\n- scsi: smartpqi: update copyright (bsc#1172418).\n- scsi: smartpqi: update logical volume size after expansion (bsc#1172418).\n- scsi: smartpqi: Use scnprintf() for avoiding potential buffer overflow (bsc#1172418).\n- scsi: storvsc: Correctly set number of hardware queues for IDE disk (git-fixes).\n- scsi: target/iblock: fix WRITE SAME zeroing (bsc#1169790).\n- sctp: Do not advertise IPv4 addresses if ipv6only is set on the socket (networking-stable-20_06_28).\n- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).\n- serial: 8250: change lock order in serial8250_do_startup() (git-fixes).\n- serial: pl011: Do not leak amba_ports entry on driver register error (git-fixes).\n- serial: pl011: Fix oops on -EPROBE_DEFER (git-fixes).\n- soc: fsl: qbman: allow registering a device link for the portal user (bsc#1174550).\n- soc: fsl: qbman_portals: add APIs to retrieve the probing status (bsc#1174550).\n- spi: davinci: Remove uninitialized_var() usage (git-fixes).\n- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).\n- spi: nxp-fspi: Ensure width is respected in spi-mem operations (bsc#1175421).\n- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1175422).\n- spi: spi-mem: export spi_mem_default_supports_op() (bsc#1175421).\n- spi: sun4i: update max transfer size reported (git-fixes).\n- staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).\n- staging: fsl-dpaa2: ethsw: Add missing netdevice check (bsc#1175423).\n- staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).\n- Staging: rtl8723bs: prevent buffer overflow in update_sta_support_rate() (git-fixes).\n- staging/speakup: fix get_word non-space look-ahead (git-fixes).\n- tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT (networking-stable-20_06_28).\n- tcp: grow window for OOO packets only for SACK flows (networking-stable-20_06_28).\n- tcp: make sure listeners do not initialize congestion-control state (networking-stable-20_07_17).\n- tcp: md5: add missing memory barriers in tcp_md5_do_add()/tcp_md5_hash_key() (networking-stable-20_07_17).\n- tcp: md5: do not send silly options in SYNCOOKIES (networking-stable-20_07_17).\n- tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key() barriers (networking-stable-20_07_17).\n- tracepoint: Mark __tracepoint_string\u0027s __used (git-fixes).\n- tracing: Use trace_sched_process_free() instead of exit() for pid tracing (git-fixes).\n- tty: serial: fsl_lpuart: add imx8qxp support (bsc#1175670).\n- tty: serial: fsl_lpuart: free IDs allocated by IDA (bsc#1175670).\n- USB: iowarrior: fix up report size handling for some devices (git-fixes).\n- usbip: tools: fix module name in man page (git-fixes).\n- USB: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).\n- USB: serial: cp210x: re-enable auto-RTS on open (git-fixes).\n- USB: serial: iuu_phoenix: fix led-activity helpers (git-fixes).\n- usb: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).\n- usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).\n- VFS: Check rename_lock in lookup_fast() (bsc#1174734).\n- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).\n- video: pxafb: Fix the function used to balance a \u0027dma_alloc_coherent()\u0027 call (git-fixes).\n- vlan: consolidate VLAN parsing code and limit max parsing depth (networking-stable-20_07_17).\n- vmxnet3: use correct tcp hdr length when packet is encapsulated (bsc#1175199).\n- vt_compat_ioctl(): clean up, use compat_ptr() properly (git-fixes).\n- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).\n- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (bsc#1111666).\n- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (bsc#1111666).\n- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (bsc#1111666).\n- wl1251: fix always return 0 error (git-fixes).\n- x86/hyper-v: Fix overflow bug in fill_gva_list() (git-fixes).\n- x86/hyperv: Make hv_vcpu_is_preempted() visible (git-fixes).\n- xfrm: check id proto in validate_tmpl() (git-fixes).\n- xfrm: clean up xfrm protocol checks (git-fixes).\n- xfrm_user: uncoditionally validate esn replay attribute struct (git-fixes).\n- xfs: fix inode allocation block res calculation precedence (git-fixes).\n- xfs: fix reflink quota reservation accounting error (git-fixes).\n- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2631,SUSE-SLE-Module-RT-15-SP1-2020-2631", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2631-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2631-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202631-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2631-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007426.html" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1074701", "url": "https://bugzilla.suse.com/1074701" }, { "category": "self", "summary": "SUSE Bug 1083548", "url": "https://bugzilla.suse.com/1083548" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1085235", "url": "https://bugzilla.suse.com/1085235" }, { "category": "self", "summary": "SUSE Bug 1085308", "url": "https://bugzilla.suse.com/1085308" }, { "category": "self", "summary": "SUSE Bug 1087078", "url": "https://bugzilla.suse.com/1087078" }, { "category": "self", "summary": "SUSE Bug 1100394", "url": "https://bugzilla.suse.com/1100394" }, { "category": "self", "summary": "SUSE Bug 1102640", "url": "https://bugzilla.suse.com/1102640" }, { "category": "self", "summary": "SUSE Bug 1105412", "url": "https://bugzilla.suse.com/1105412" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1120163", "url": "https://bugzilla.suse.com/1120163" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1169790", "url": "https://bugzilla.suse.com/1169790" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1172108", "url": "https://bugzilla.suse.com/1172108" }, { "category": "self", "summary": "SUSE Bug 1172247", "url": "https://bugzilla.suse.com/1172247" }, { "category": "self", "summary": "SUSE Bug 1172418", "url": "https://bugzilla.suse.com/1172418" }, { "category": "self", "summary": "SUSE Bug 1172428", "url": "https://bugzilla.suse.com/1172428" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172871", "url": "https://bugzilla.suse.com/1172871" }, { "category": "self", "summary": "SUSE Bug 1172872", "url": "https://bugzilla.suse.com/1172872" }, { "category": "self", "summary": "SUSE Bug 1172963", "url": "https://bugzilla.suse.com/1172963" }, { "category": "self", "summary": "SUSE Bug 1173485", "url": "https://bugzilla.suse.com/1173485" }, { "category": "self", "summary": "SUSE Bug 1173798", "url": "https://bugzilla.suse.com/1173798" }, { "category": "self", "summary": "SUSE Bug 1173954", "url": "https://bugzilla.suse.com/1173954" }, { "category": "self", "summary": "SUSE Bug 1174003", "url": "https://bugzilla.suse.com/1174003" }, { "category": "self", "summary": "SUSE Bug 1174026", "url": "https://bugzilla.suse.com/1174026" }, { "category": "self", "summary": "SUSE Bug 1174070", "url": "https://bugzilla.suse.com/1174070" }, { "category": "self", "summary": "SUSE Bug 1174161", "url": "https://bugzilla.suse.com/1174161" }, { "category": "self", "summary": "SUSE Bug 1174205", "url": "https://bugzilla.suse.com/1174205" }, { "category": "self", "summary": "SUSE Bug 1174247", "url": "https://bugzilla.suse.com/1174247" }, { "category": "self", "summary": "SUSE Bug 1174298", "url": "https://bugzilla.suse.com/1174298" }, { "category": "self", "summary": "SUSE Bug 1174299", "url": "https://bugzilla.suse.com/1174299" }, { "category": "self", "summary": "SUSE Bug 1174387", "url": "https://bugzilla.suse.com/1174387" }, { "category": "self", "summary": "SUSE Bug 1174484", "url": "https://bugzilla.suse.com/1174484" }, { "category": "self", "summary": "SUSE Bug 1174547", "url": "https://bugzilla.suse.com/1174547" }, { "category": "self", "summary": "SUSE Bug 1174549", "url": "https://bugzilla.suse.com/1174549" }, { "category": "self", "summary": "SUSE Bug 1174550", "url": "https://bugzilla.suse.com/1174550" }, { "category": "self", "summary": "SUSE Bug 1174625", "url": "https://bugzilla.suse.com/1174625" }, { "category": "self", "summary": "SUSE Bug 1174658", "url": "https://bugzilla.suse.com/1174658" }, { "category": "self", "summary": "SUSE Bug 1174685", "url": "https://bugzilla.suse.com/1174685" }, { "category": "self", "summary": "SUSE Bug 1174689", "url": "https://bugzilla.suse.com/1174689" }, { "category": "self", "summary": "SUSE Bug 1174699", "url": "https://bugzilla.suse.com/1174699" }, { "category": "self", "summary": "SUSE Bug 1174734", "url": "https://bugzilla.suse.com/1174734" }, { "category": "self", "summary": "SUSE Bug 1174757", "url": "https://bugzilla.suse.com/1174757" }, { "category": "self", "summary": "SUSE Bug 1174771", "url": "https://bugzilla.suse.com/1174771" }, { "category": "self", "summary": "SUSE Bug 1174840", "url": "https://bugzilla.suse.com/1174840" }, { "category": "self", "summary": "SUSE Bug 1174841", "url": "https://bugzilla.suse.com/1174841" }, { "category": "self", "summary": "SUSE Bug 1174843", "url": "https://bugzilla.suse.com/1174843" }, { "category": "self", "summary": "SUSE Bug 1174844", "url": "https://bugzilla.suse.com/1174844" }, { "category": "self", "summary": "SUSE Bug 1174845", "url": "https://bugzilla.suse.com/1174845" }, { "category": "self", "summary": "SUSE Bug 1174852", "url": "https://bugzilla.suse.com/1174852" }, { "category": "self", "summary": "SUSE Bug 1174873", "url": "https://bugzilla.suse.com/1174873" }, { "category": "self", "summary": "SUSE Bug 1174887", "url": "https://bugzilla.suse.com/1174887" }, { "category": "self", "summary": "SUSE Bug 1174904", "url": "https://bugzilla.suse.com/1174904" }, { "category": "self", "summary": "SUSE Bug 1174926", "url": "https://bugzilla.suse.com/1174926" }, { "category": "self", "summary": "SUSE Bug 1174968", "url": "https://bugzilla.suse.com/1174968" }, { "category": "self", "summary": "SUSE Bug 1175062", "url": "https://bugzilla.suse.com/1175062" }, { "category": "self", "summary": "SUSE Bug 1175063", "url": "https://bugzilla.suse.com/1175063" }, { "category": "self", "summary": "SUSE Bug 1175064", "url": "https://bugzilla.suse.com/1175064" }, { "category": "self", "summary": "SUSE Bug 1175065", "url": "https://bugzilla.suse.com/1175065" }, { "category": "self", "summary": "SUSE Bug 1175066", "url": "https://bugzilla.suse.com/1175066" }, { "category": "self", "summary": "SUSE Bug 1175067", "url": "https://bugzilla.suse.com/1175067" }, { "category": "self", "summary": "SUSE Bug 1175112", "url": "https://bugzilla.suse.com/1175112" }, { "category": "self", "summary": "SUSE Bug 1175127", "url": "https://bugzilla.suse.com/1175127" }, { "category": "self", "summary": "SUSE Bug 1175128", "url": "https://bugzilla.suse.com/1175128" }, { "category": "self", "summary": "SUSE Bug 1175149", "url": "https://bugzilla.suse.com/1175149" }, { "category": "self", "summary": "SUSE Bug 1175199", "url": "https://bugzilla.suse.com/1175199" }, { "category": "self", "summary": "SUSE Bug 1175213", "url": "https://bugzilla.suse.com/1175213" }, { "category": "self", "summary": "SUSE Bug 1175228", "url": "https://bugzilla.suse.com/1175228" }, { "category": "self", "summary": "SUSE Bug 1175232", "url": "https://bugzilla.suse.com/1175232" }, { "category": "self", "summary": "SUSE Bug 1175284", "url": "https://bugzilla.suse.com/1175284" }, { "category": "self", "summary": "SUSE Bug 1175393", "url": "https://bugzilla.suse.com/1175393" }, { "category": "self", "summary": "SUSE Bug 1175394", "url": "https://bugzilla.suse.com/1175394" }, { "category": "self", "summary": "SUSE Bug 1175396", "url": "https://bugzilla.suse.com/1175396" }, { "category": "self", "summary": "SUSE Bug 1175397", "url": "https://bugzilla.suse.com/1175397" }, { "category": "self", "summary": "SUSE Bug 1175398", "url": "https://bugzilla.suse.com/1175398" }, { "category": "self", "summary": "SUSE Bug 1175399", "url": "https://bugzilla.suse.com/1175399" }, { "category": "self", "summary": "SUSE Bug 1175400", "url": "https://bugzilla.suse.com/1175400" }, { "category": "self", "summary": "SUSE Bug 1175401", "url": "https://bugzilla.suse.com/1175401" }, { "category": "self", "summary": "SUSE Bug 1175402", "url": "https://bugzilla.suse.com/1175402" }, { "category": "self", "summary": "SUSE Bug 1175403", "url": "https://bugzilla.suse.com/1175403" }, { "category": "self", "summary": "SUSE Bug 1175404", "url": "https://bugzilla.suse.com/1175404" }, { "category": "self", "summary": "SUSE Bug 1175405", "url": "https://bugzilla.suse.com/1175405" }, { "category": "self", "summary": "SUSE Bug 1175406", "url": "https://bugzilla.suse.com/1175406" }, { "category": "self", "summary": "SUSE Bug 1175407", "url": "https://bugzilla.suse.com/1175407" }, { "category": "self", "summary": "SUSE Bug 1175408", "url": "https://bugzilla.suse.com/1175408" }, { "category": "self", "summary": "SUSE Bug 1175409", "url": "https://bugzilla.suse.com/1175409" }, { "category": "self", "summary": "SUSE Bug 1175410", "url": "https://bugzilla.suse.com/1175410" }, { "category": "self", "summary": "SUSE Bug 1175411", "url": "https://bugzilla.suse.com/1175411" }, { "category": "self", "summary": "SUSE Bug 1175412", "url": "https://bugzilla.suse.com/1175412" }, { "category": "self", "summary": "SUSE Bug 1175413", "url": "https://bugzilla.suse.com/1175413" }, { "category": "self", "summary": "SUSE Bug 1175414", "url": "https://bugzilla.suse.com/1175414" }, { "category": "self", "summary": "SUSE Bug 1175415", "url": "https://bugzilla.suse.com/1175415" }, { "category": "self", "summary": "SUSE Bug 1175416", "url": "https://bugzilla.suse.com/1175416" }, { "category": "self", "summary": "SUSE Bug 1175417", "url": "https://bugzilla.suse.com/1175417" }, { "category": "self", "summary": "SUSE Bug 1175418", "url": "https://bugzilla.suse.com/1175418" }, { "category": "self", "summary": "SUSE Bug 1175419", "url": "https://bugzilla.suse.com/1175419" }, { "category": "self", "summary": "SUSE Bug 1175420", "url": "https://bugzilla.suse.com/1175420" }, { "category": "self", "summary": "SUSE Bug 1175421", "url": "https://bugzilla.suse.com/1175421" }, { "category": "self", "summary": "SUSE Bug 1175422", "url": "https://bugzilla.suse.com/1175422" }, { "category": "self", "summary": "SUSE Bug 1175423", "url": "https://bugzilla.suse.com/1175423" }, { "category": "self", "summary": "SUSE Bug 1175440", "url": "https://bugzilla.suse.com/1175440" }, { "category": "self", "summary": "SUSE Bug 1175493", "url": "https://bugzilla.suse.com/1175493" }, { "category": "self", "summary": "SUSE Bug 1175515", "url": "https://bugzilla.suse.com/1175515" }, { "category": "self", "summary": "SUSE Bug 1175518", "url": "https://bugzilla.suse.com/1175518" }, { "category": "self", "summary": "SUSE Bug 1175526", "url": "https://bugzilla.suse.com/1175526" }, { "category": "self", "summary": "SUSE Bug 1175550", "url": "https://bugzilla.suse.com/1175550" }, { "category": "self", "summary": "SUSE Bug 1175654", "url": "https://bugzilla.suse.com/1175654" }, { "category": "self", "summary": "SUSE Bug 1175666", "url": "https://bugzilla.suse.com/1175666" }, { "category": "self", "summary": "SUSE Bug 1175668", "url": "https://bugzilla.suse.com/1175668" }, { "category": "self", "summary": "SUSE Bug 1175669", "url": "https://bugzilla.suse.com/1175669" }, { "category": "self", "summary": "SUSE Bug 1175670", "url": "https://bugzilla.suse.com/1175670" }, { "category": "self", "summary": "SUSE Bug 1175767", "url": "https://bugzilla.suse.com/1175767" }, { "category": "self", "summary": "SUSE Bug 1175768", "url": "https://bugzilla.suse.com/1175768" }, { "category": "self", "summary": "SUSE Bug 1175769", "url": "https://bugzilla.suse.com/1175769" }, { "category": "self", "summary": "SUSE Bug 1175770", "url": "https://bugzilla.suse.com/1175770" }, { "category": "self", "summary": "SUSE Bug 1175771", "url": "https://bugzilla.suse.com/1175771" }, { "category": "self", "summary": "SUSE Bug 1175772", "url": "https://bugzilla.suse.com/1175772" }, { "category": "self", "summary": "SUSE Bug 1175786", "url": "https://bugzilla.suse.com/1175786" }, { "category": "self", "summary": "SUSE Bug 1175873", "url": "https://bugzilla.suse.com/1175873" }, { "category": "self", "summary": "SUSE Bug 1175992", "url": "https://bugzilla.suse.com/1175992" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14314 page", "url": "https://www.suse.com/security/cve/CVE-2020-14314/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14356 page", "url": "https://www.suse.com/security/cve/CVE-2020-14356/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16166 page", "url": "https://www.suse.com/security/cve/CVE-2020-16166/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24394 page", "url": "https://www.suse.com/security/cve/CVE-2020-24394/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-09-14T16:34:45Z", "generator": { "date": "2020-09-14T16:34:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2631-1", "initial_release_date": "2020-09-14T16:34:45Z", "revision_history": [ { "date": "2020-09-14T16:34:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.12.14-14.31.1.noarch", "product": { "name": "kernel-devel-rt-4.12.14-14.31.1.noarch", "product_id": "kernel-devel-rt-4.12.14-14.31.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.12.14-14.31.1.noarch", "product": { "name": "kernel-source-rt-4.12.14-14.31.1.noarch", "product_id": "kernel-source-rt-4.12.14-14.31.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.12.14-14.31.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.12.14-14.31.1.x86_64", "product_id": "cluster-md-kmp-rt-4.12.14-14.31.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-4.12.14-14.31.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-4.12.14-14.31.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-4.12.14-14.31.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.12.14-14.31.1.x86_64", "product": { "name": "dlm-kmp-rt-4.12.14-14.31.1.x86_64", "product_id": "dlm-kmp-rt-4.12.14-14.31.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-4.12.14-14.31.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-4.12.14-14.31.1.x86_64", "product_id": "dlm-kmp-rt_debug-4.12.14-14.31.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.12.14-14.31.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.12.14-14.31.1.x86_64", "product_id": "gfs2-kmp-rt-4.12.14-14.31.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-4.12.14-14.31.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-4.12.14-14.31.1.x86_64", "product_id": "gfs2-kmp-rt_debug-4.12.14-14.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.12.14-14.31.1.x86_64", "product": { "name": "kernel-rt-4.12.14-14.31.1.x86_64", "product_id": "kernel-rt-4.12.14-14.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.12.14-14.31.1.x86_64", "product": { "name": "kernel-rt-base-4.12.14-14.31.1.x86_64", "product_id": "kernel-rt-base-4.12.14-14.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.12.14-14.31.1.x86_64", "product": { "name": "kernel-rt-devel-4.12.14-14.31.1.x86_64", "product_id": "kernel-rt-devel-4.12.14-14.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-4.12.14-14.31.1.x86_64", "product": { "name": "kernel-rt-extra-4.12.14-14.31.1.x86_64", "product_id": "kernel-rt-extra-4.12.14-14.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-devel-4.12.14-14.31.1.x86_64", "product": { "name": "kernel-rt-livepatch-devel-4.12.14-14.31.1.x86_64", "product_id": "kernel-rt-livepatch-devel-4.12.14-14.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-4.12.14-14.31.1.x86_64", "product": { "name": "kernel-rt_debug-4.12.14-14.31.1.x86_64", "product_id": "kernel-rt_debug-4.12.14-14.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-base-4.12.14-14.31.1.x86_64", "product": { "name": "kernel-rt_debug-base-4.12.14-14.31.1.x86_64", "product_id": "kernel-rt_debug-base-4.12.14-14.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.12.14-14.31.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.12.14-14.31.1.x86_64", "product_id": "kernel-rt_debug-devel-4.12.14-14.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-4.12.14-14.31.1.x86_64", "product": { "name": "kernel-rt_debug-extra-4.12.14-14.31.1.x86_64", "product_id": "kernel-rt_debug-extra-4.12.14-14.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-livepatch-devel-4.12.14-14.31.1.x86_64", "product": { "name": "kernel-rt_debug-livepatch-devel-4.12.14-14.31.1.x86_64", "product_id": "kernel-rt_debug-livepatch-devel-4.12.14-14.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.12.14-14.31.1.x86_64", "product": { "name": "kernel-syms-rt-4.12.14-14.31.1.x86_64", "product_id": "kernel-syms-rt-4.12.14-14.31.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-4.12.14-14.31.1.x86_64", "product": { "name": "kselftests-kmp-rt-4.12.14-14.31.1.x86_64", "product_id": "kselftests-kmp-rt-4.12.14-14.31.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-4.12.14-14.31.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-4.12.14-14.31.1.x86_64", "product_id": "kselftests-kmp-rt_debug-4.12.14-14.31.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.12.14-14.31.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.12.14-14.31.1.x86_64", "product_id": "ocfs2-kmp-rt-4.12.14-14.31.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-4.12.14-14.31.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-4.12.14-14.31.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-4.12.14-14.31.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-4.12.14-14.31.1.x86_64", "product": { "name": "reiserfs-kmp-rt-4.12.14-14.31.1.x86_64", "product_id": "reiserfs-kmp-rt-4.12.14-14.31.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt_debug-4.12.14-14.31.1.x86_64", "product": { "name": "reiserfs-kmp-rt_debug-4.12.14-14.31.1.x86_64", "product_id": "reiserfs-kmp-rt_debug-4.12.14-14.31.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Real Time Module 15 SP1", "product": { "name": "SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-rt:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.12.14-14.31.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.31.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.12.14-14.31.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.12.14-14.31.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.31.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.12.14-14.31.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.12.14-14.31.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.31.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.12.14-14.31.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.12.14-14.31.1.noarch as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.31.1.noarch" }, "product_reference": "kernel-devel-rt-4.12.14-14.31.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.12.14-14.31.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.31.1.x86_64" }, "product_reference": "kernel-rt-4.12.14-14.31.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.12.14-14.31.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.31.1.x86_64" }, "product_reference": "kernel-rt-base-4.12.14-14.31.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.12.14-14.31.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.31.1.x86_64" }, "product_reference": "kernel-rt-devel-4.12.14-14.31.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.12.14-14.31.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.31.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.12.14-14.31.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.12.14-14.31.1.noarch as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.31.1.noarch" }, "product_reference": "kernel-source-rt-4.12.14-14.31.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.12.14-14.31.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.31.1.x86_64" }, "product_reference": "kernel-syms-rt-4.12.14-14.31.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.12.14-14.31.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.31.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.12.14-14.31.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14314", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14314" } ], "notes": [ { "category": "general", "text": "A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14314", "url": "https://www.suse.com/security/cve/CVE-2020-14314" }, { "category": "external", "summary": "SUSE Bug 1173798 for CVE-2020-14314", "url": "https://bugzilla.suse.com/1173798" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-14T16:34:45Z", "details": "moderate" } ], "title": "CVE-2020-14314" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-14T16:34:45Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14356" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14356", "url": "https://www.suse.com/security/cve/CVE-2020-14356" }, { "category": "external", "summary": "SUSE Bug 1175213 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1175213" }, { "category": "external", "summary": "SUSE Bug 1176392 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1176392" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-14T16:34:45Z", "details": "moderate" } ], "title": "CVE-2020-14356" }, { "cve": "CVE-2020-16166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16166" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16166", "url": "https://www.suse.com/security/cve/CVE-2020-16166" }, { "category": "external", "summary": "SUSE Bug 1174757 for CVE-2020-16166", "url": "https://bugzilla.suse.com/1174757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-14T16:34:45Z", "details": "moderate" } ], "title": "CVE-2020-16166" }, { "cve": "CVE-2020-24394", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24394" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24394", "url": "https://www.suse.com/security/cve/CVE-2020-24394" }, { "category": "external", "summary": "SUSE Bug 1175518 for CVE-2020-24394", "url": "https://bugzilla.suse.com/1175518" }, { "category": "external", "summary": "SUSE Bug 1175992 for CVE-2020-24394", "url": "https://bugzilla.suse.com/1175992" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.31.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.31.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-14T16:34:45Z", "details": "important" } ], "title": "CVE-2020-24394" } ] }
suse-su-2020:2574-1
Vulnerability from csaf_suse
Published
2020-09-08 15:53
Modified
2020-09-08 15:53
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup (bsc#1165629).
- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).
- CVE-2020-14356: Fixed a null pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213).
- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).
- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).
- CVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).
- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).
The following non-security bugs were fixed:
- ACPI: kABI fixes for subsys exports (bsc#1174968).
- ACPI / LPSS: Resume BYT/CHT I2C controllers from resume_noirq (bsc#1174968).
- ACPI / LPSS: Use acpi_lpss_* instead of acpi_subsys_* functions for hibernate (bsc#1174968).
- ACPI: PM: Introduce 'poweroff' callbacks for ACPI PM domain and LPSS (bsc#1174968).
- ACPI: PM: Simplify and fix PM domain hibernation callbacks (bsc#1174968).
- ALSA: core: pcm_iec958: fix kernel-doc (bsc#1111666).
- ALSA: echoaduio: Drop superfluous volatile modifier (bsc#1111666).
- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (bsc#1111666).
- ALSA: hda: Add support for Loongson 7A1000 controller (bsc#1111666).
- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (bsc#1111666).
- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (bsc#1111666).
- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (bsc#1111666).
- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).
- ALSA: hda: fix snd_hda_codec_cleanup() documentation (bsc#1111666).
- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (bsc#1111666).
- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (bsc#1111666).
- ALSA: hda/realtek: Add model alc298-samsung-headphone (git-fixes).
- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (bsc#1111666).
- ALSA: hda/realtek - Add quirk for Lenovo Carbon X1 8th gen (bsc#1111666).
- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (bsc#1111666).
- ALSA: hda/realtek - Add quirk for MSI GL63 (bsc#1111666).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex Book (git-fixes).
- ALSA: hda/realtek - change to suitable link model for ASUS platform (bsc#1111666).
- ALSA: hda/realtek - Check headset type by unplug and resume (bsc#1111666).
- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (bsc#1111666).
- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (bsc#1111666).
- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (bsc#1111666).
- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (bsc#1111666).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (bsc#1111666).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (bsc#1111666).
- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (bsc#1111666).
- ALSA: hda/realtek: Fix add a 'ultra_low_power' function for intel reference board (alc256) (bsc#1111666).
- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (bsc#1111666).
- ALSA: hda/realtek - Fixed HP right speaker no sound (bsc#1111666).
- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (bsc#1111666).
- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (bsc#1111666).
- ALSA: hda/realtek - Fix unused variable warning (bsc#1111666).
- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (bsc#1111666).
- ALSA: hda - reverse the setting value in the micmute_led_set (bsc#1111666).
- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).
- ALSA: pci: delete repeated words in comments (bsc#1111666).
- ALSA: seq: oss: Serialize ioctls (bsc#1111666).
- ALSA: usb-audio: Add capture support for Saffire 6 (USB 1.1) (git-fixes).
- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (bsc#1111666).
- ALSA: usb-audio: add startech usb audio dock name (bsc#1111666).
- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (bsc#1111666).
- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (bsc#1111666).
- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (bsc#1111666).
- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (bsc#1111666).
- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).
- ALSA: usb-audio: fix spelling mistake 'buss' -> 'bus' (bsc#1111666).
- ALSA: usb-audio: ignore broken processing/extension unit (git-fixes).
- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (bsc#1111666).
- ALSA: usb/line6: remove 'defined but not used' warning (bsc#1111666).
- arm64: Add MIDR encoding for HiSilicon Taishan CPUs (bsc#1174547).
- arm64: Add MIDR encoding for NVIDIA CPUs (bsc#1174547).
- arm64: add sysfs vulnerability show for meltdown (bsc#1174547).
- arm64: Add sysfs vulnerability show for spectre-v1 (bsc#1174547).
- arm64: add sysfs vulnerability show for spectre-v2 (bsc#1174547).
- arm64: add sysfs vulnerability show for speculative store bypass (bsc#1174547).
- arm64: Advertise mitigation of Spectre-v2, or lack thereof (bsc#1174547).
- arm64: Always enable spectre-v2 vulnerability detection (bsc#1174547).
- arm64: Always enable ssb vulnerability detection (bsc#1174547).
- arm64: backtrace: Do not bother trying to unwind the userspace stack (bsc#1175397).
- arm64: capabilities: Add NVIDIA Denver CPU to bp_harden list (bsc#1174547).
- arm64: capabilities: Merge duplicate Cavium erratum entries (bsc#1174547).
- arm64: capabilities: Merge entries for ARM64_WORKAROUND_CLEAN_CACHE (bsc#1174547).
- arm64: cpufeature: Enable Qualcomm Falkor/Kryo errata 1003 (bsc#1175398).
- arm64: Do not mask out PTE_RDONLY in pte_same() (bsc#1175393).
- arm64: enable generic CPU vulnerabilites support (bsc#1174547). Update config/arm64/default
- arm64: Ensure VM_WRITE|VM_SHARED ptes are clean by default (bsc#1175394).
- arm64: errata: Do not define type field twice for arm64_errata entries (bsc#1174547).
- arm64: errata: Update stale comment (bsc#1174547).
- arm64: Get rid of __smccc_workaround_1_hvc_* (bsc#1174547).
- arm64: kpti: Avoid rewriting early page tables when KASLR is enabled (bsc#1174547).
- arm64: kpti: Update arm64_kernel_use_ng_mappings() when forced on (bsc#1174547).
- arm64: kpti: Whitelist Cortex-A CPUs that do not implement the CSV3 field (bsc#1174547).
- arm64: kpti: Whitelist HiSilicon Taishan v110 CPUs (bsc#1174547).
- arm64: KVM: Avoid setting the upper 32 bits of VTCR_EL2 to 1 (bsc#1133021).
- arm64: KVM: Guests can skip __install_bp_hardening_cb()s HYP work (bsc#1174547).
- arm64: KVM: Use SMCCC_ARCH_WORKAROUND_1 for Falkor BP hardening (bsc#1174547).
- arm64: mm: Fix pte_mkclean, pte_mkdirty semantics (bsc#1175526).
- arm64: Provide a command line to disable spectre_v2 mitigation (bsc#1174547).
- arm64: Silence clang warning on mismatched value/register sizes (bsc#1175396).
- arm64/speculation: Support 'mitigations=' cmdline option (bsc#1174547).
- arm64: ssbd: explicitly depend on <linux/prctl.h> (bsc#1175399).
- arm64: ssbs: Do not treat CPUs with SSBS as unaffected by SSB (bsc#1174547).
- arm64: ssbs: Fix context-switch when SSBS is present on all CPUs (bsc#1175669).
- arm64/sve: Fix wrong free for task->thread.sve_state (bsc#1175400).
- arm64/sve: <uapi/asm/ptrace.h> should not depend on <uapi/linux/prctl.h> (bsc#1175401).
- arm64: tlbflush: avoid writing RES0 bits (bsc#1175402).
- arm64: Use firmware to detect CPUs that are not affected by Spectre-v2 (bsc#1174547).
- ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17 (bsc#1133021).
- ARM: KVM: invalidate icache on guest exit for Cortex-A15 (bsc#1133021).
- ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15 (bsc#1133021).
- ASoC: hda/tegra: Set buffer alignment to 128 bytes (bsc#1111666).
- bcache: allocate meta data pages as compound pages (bsc#1172873).
- bcache: allocate meta data pages as compound pages (bsc#1172873).
- block: check queue's limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).
- block: check queue's limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).
- block: Fix use-after-free in blkdev_get() (bsc#1174843).
- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).
- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).
- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (bsc#1111666).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (bsc#1111666).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (bsc#1111666).
- bonding: fix active-backup failover for current ARP slave (bsc#1174771).
- bonding: fix a potential double-unregister (git-fixes).
- bonding: show saner speed for broadcast mode (git-fixes).
- bpf: Fix map leak in HASH_OF_MAPS map (git-fixes).
- brcmfmac: keep SDIO watchdog running when console_interval is non-zero (bsc#1111666).
- brcmfmac: set state of hanger slot to FREE when flushing PSQ (bsc#1111666).
- brcmfmac: To fix Bss Info flag definition Bug (bsc#1111666).
- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).
- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).
- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).
- btrfs: fix block group leak when removing fails (bsc#1175149).
- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).
- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).
- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).
- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).
- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).
- btrfs: fix memory leaks after failure to lookup checksums during inode logging (bsc#1175550).
- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).
- btrfs: fix race between block group removal and block group creation (bsc#1175149).
- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).
- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).
- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).
- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).
- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).
- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).
- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).
- btrfs: Open code btrfs_write_and_wait_marked_extents (bsc#1175149).
- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).
- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).
- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).
- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).
- btrfs: Rename and export clear_btree_io_tree (bsc#1175149).
- btrfs: treat RWF_{,D}SYNC writes as sync for CRCs (bsc#1175493).
- bus: hisi_lpc: Add .remove method to avoid driver unbind crash (bsc#1174658).
- bus: hisi_lpc: Do not fail probe for unrecognised child devices (bsc#1174658).
- bus: hisi_lpc: Unregister logical PIO range to avoid potential use-after-free (bsc#1174658).
- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).
- cfg80211: check vendor command doit pointer before use (git-fixes).
- char: virtio: Select VIRTIO from VIRTIO_CONSOLE (bsc#1175667).
- cifs: document and cleanup dfs mount (bsc#1144333 bsc#1172428).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1144333 bsc#1172428).
- cifs: fix double free error on share and prefix (bsc#1144333 bsc#1172428).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1144333 bsc#1172428).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1144333 bsc#1172428).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1144333 bsc#1172428).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1144333 bsc#1172428).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1144333 bsc#1172428).
- cifs: rename reconn_inval_dfs_target() (bsc#1144333 bsc#1172428).
- clk: at91: clk-generated: check best_rate against ranges (bsc#1111666).
- clk: clk-atlas6: fix return value check in atlas6_clk_init() (bsc#1111666).
- clk: iproc: round clock rate to the closest (bsc#1111666).
- clk: spear: Remove uninitialized_var() usage (git-fixes).
- clk: st: Remove uninitialized_var() usage (git-fixes).
- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1174549
- console: newport_con: fix an issue about leak related system resources (git-fixes).
- constrants: fix malformed XML Closing tag of an element is '</foo>', not '<foo/>'. Fixes: 8b37de2eb835 ('rpm/constraints.in: Increase memory for kernel-docs')
- Created new preempt kernel flavor (jsc#SLE-11309) Configs are cloned from the respective $arch/default configs. All changed configs appart from CONFIG_PREEMPT->y are a result of dependencies, namely many lock/unlock primitives are no longer inlined in the preempt kernel. TREE_RCU has been also changed to PREEMPT_RCU which is the default implementation for PREEMPT kernel.
- crypto: ccp - Fix use of merged scatterlists (git-fixes).
- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).
- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).
- crypto: rockchip - fix scatterlist nents error (git-fixes).
- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).
- crypto: talitos - check AES key size (git-fixes).
- crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK (git-fixes).
- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- dev: Defer free of skbs in flush_backlog (git-fixes).
- device property: Fix the secondary firmware node handling in set_primary_fwnode() (git-fixes).
- devres: keep both device name and resource name in pretty name (git-fixes).
- dlm: Fix kobject memleak (bsc#1175768).
- dlm: remove BUG() before panic() (bsc#1174844).
- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).
- Documentation/networking: Add net DIM documentation (bsc#1174852).
- dpaa2-eth: Fix passing zero to 'PTR_ERR' warning (bsc#1175403).
- dpaa2-eth: free already allocated channels on probe defer (bsc#1175404).
- dpaa2-eth: prevent array underflow in update_cls_rule() (bsc#1175405).
- dpaa_eth: add dropped frames to percpu ethtool stats (bsc#1174550).
- dpaa_eth: add newline in dev_err() msg (bsc#1174550).
- dpaa_eth: avoid timestamp read on error paths (bsc#1175406).
- dpaa_eth: change DMA device (bsc#1174550).
- dpaa_eth: cleanup skb_to_contig_fd() (bsc#1174550).
- dpaa_eth: defer probing after qbman (bsc#1174550).
- dpaa_eth: extend delays in ndo_stop (bsc#1174550).
- dpaa_eth: fix DMA mapping leak (bsc#1174550).
- dpaa_eth: Fix one possible memleak in dpaa_eth_probe (bsc#1174550).
- dpaa_eth: FMan erratum A050385 workaround (bsc#1174550).
- dpaa_eth: perform DMA unmapping before read (bsc#1175407).
- dpaa_eth: register a device link for the qman portal used (bsc#1174550).
- dpaa_eth: remove netdev_err() for user errors (bsc#1174550).
- dpaa_eth: remove redundant code (bsc#1174550).
- dpaa_eth: simplify variables used in dpaa_cleanup_tx_fd() (bsc#1174550).
- dpaa_eth: use a page to store the SGT (bsc#1174550).
- dpaa_eth: use fd information in dpaa_cleanup_tx_fd() (bsc#1174550).
- dpaa_eth: use only one buffer pool per interface (bsc#1174550).
- dpaa_eth: use page backed rx buffers (bsc#1174550).
- driver core: Avoid binding drivers to dead devices (git-fixes).
- Drivers: hv: balloon: Remove dependencies on guest page size (git-fixes).
- Drivers: hv: vmbus: Fix virt_to_hvpfn() for X86_PAE (git-fixes).
- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127, bsc#1175128).
- Drivers: hv: vmbus: Remove the undesired put_cpu_ptr() in hv_synic_cleanup() (git-fixes).
- drivers/perf: hisi: Fix typo in events attribute array (bsc#1175408).
- drivers/perf: hisi: Fixup one DDRC PMU register offset (bsc#1175410).
- drivers/perf: hisi: Fix wrong value for all counters enable (bsc#1175409).
- drm: Added orientation quirk for ASUS tablet model T103HAF (bsc#1111666).
- drm/amd/display: fix pow() crashing when given base 0 (git-fixes).
- drm/amdgpu: avoid dereferencing a NULL pointer (bsc#1111666).
- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (bsc#1111666).
- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (bsc#1113956) * refresh for context changes
- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).
- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1113956)
- drm/arm: fix unintentional integer overflow on left shift (git-fixes).
- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1113956) * refreshed for context changes
- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).
- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1113956) * move drm_mipi_dbi.c -> tinydrm/mipi-drm.c * refresh for context changes
- drm/debugfs: fix plain echo to connector 'force' attribute (bsc#1111666).
- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).
- drm/etnaviv: fix ref count leak via pm_runtime_get_sync (bsc#1111666).
- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (bsc#1112178) * updated names of get/put functions
- drm: hold gem reference until object is no longer accessed (bsc#1113956)
- drm/imx: fix use after free (git-fixes).
- drm/imx: imx-ldb: Disable both channels for split mode in enc->disable() (git-fixes).
- drm/imx: tve: fix regulator_disable error path (git-fixes).
- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).
- drm/msm/adreno: fix updating ring fence (git-fixes).
- drm/msm: ratelimit crtc event overflow error (bsc#1111666).
- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).
- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).
- drm/nouveau: fix multiple instances of reference count leaks (bsc#1111666).
- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).
- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).
- drm/radeon: disable AGP by default (bsc#1111666).
- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).
- drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync (bsc#1111666).
- drm/rockchip: fix VOP_WIN_GET macro (bsc#1175411).
- drm/tilcdc: fix leak & null ref in panel_connector_get_modes (bsc#1111666).
- drm/ttm/nouveau: do not call tt destroy callback on alloc failure (bsc#1175232).
- drm/vmwgfx: Fix two list_for_each loop exit tests (bsc#1111666).
- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (bsc#1111666).
- drm/xen-front: Fix misused IS_ERR_OR_NULL checks (bsc#1065600).
- EDAC: Fix reference count leaks (bsc#1112178).
- efi/memreserve: deal with memreserve entries in unmapped memory (bsc#1174685).
- ext4: check journal inode extents more carefully (bsc#1173485).
- ext4: do not allow overlapping system zones (bsc#1173485).
- ext4: fix checking of directory entry validity for inline directories (bsc#1175771).
- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1174840).
- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).
- fat: do not allow to mount if the FAT length == 0 (bsc#1174845).
- fbdev: Detect integer underflow at 'struct fbcon_ops'->clear_margins. (bsc#1112178) * move files drivers/video/fbdev/core -> drivers/video/console * refresh for context changes
- firmware: google: check if size is valid when decoding VPD data (git-fixes).
- firmware: google: increment VPD key_len properly (git-fixes).
- fpga: dfl: fix bug in port reset handshake (git-fixes).
- fsl/fman: add API to get the device behind a fman port (bsc#1174550).
- fsl/fman: check dereferencing null pointer (git-fixes).
- fsl/fman: detect FMan erratum A050385 (bsc#1174550).
- fsl/fman: do not touch liodn base regs reserved on non-PAMU SoCs (bsc#1174550).
- fsl/fman: fix dereference null return value (git-fixes).
- fsl/fman: fix eth hash table allocation (git-fixes).
- fsl/fman: fix unreachable code (git-fixes).
- fsl/fman: remove unused struct member (bsc#1174550).
- fsl/fman: use 32-bit unsigned integer (git-fixes).
- fuse: fix memleak in cuse_channel_open (bsc#1174926).
- fuse: fix missing unlock_page in fuse_writepage() (bsc#1174904).
- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175062).
- fuse: fix weird page warning (bsc#1175063).
- fuse: flush dirty data/metadata before non-truncate setattr (bsc#1175064).
- fuse: truncate pending writes on O_TRUNC (bsc#1175065).
- fuse: verify attributes (bsc#1175066).
- fuse: verify nlink (bsc#1175067).
- genetlink: remove genl_bind (networking-stable-20_07_17).
- go7007: add sanity checking for endpoints (git-fixes).
- gpu: host1x: debug: Fix multiple channels emitting messages simultaneously (bsc#1111666).
- HID: hiddev: fix mess in hiddev_open() (git-fixes).
- HISI LPC: Re-Add ACPI child enumeration support (bsc#1174658).
- HISI LPC: Stop using MFD APIs (bsc#1174658).
- hv_balloon: Balloon up according to request page number (git-fixes).
- hv_balloon: Use a static page for the balloon_up send buffer (git-fixes).
- hv_netvsc: Allow scatter-gather feature to be tunable (git-fixes).
- hv_netvsc: do not use VF device if link is down (git-fixes).
- hv_netvsc: Fix a warning of suspicious RCU usage (git-fixes).
- hv_netvsc: Fix error handling in netvsc_attach() (git-fixes).
- hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (git-fixes).
- hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (git-fixes).
- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (git-fixes).
- hv_netvsc: flag software created hash value (git-fixes).
- hv_netvsc: Remove 'unlikely' from netvsc_select_queue (git-fixes).
- i2c: rcar: in slave mode, clear NACK earlier (git-fixes).
- i2c: rcar: slave: only send STOP event when we have been addressed (bsc#1111666).
- i40e: Fix crash during removing i40e driver (git-fixes).
- i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (git-fixes).
- ibmveth: Fix use of ibmveth in a bridge (bsc#1174387 ltc#187506).
- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).
- ibmvnic fix NULL tx_pools and rx_tools issue at do_reset (bsc#1175873 ltc#187922).
- include/linux/poison.h: remove obsolete comment (git fixes (poison)).
- Input: psmouse - add a newline when printing 'proto' by sysfs (git-fixes).
- Input: sentelic - fix error return when fsp_reg_write fails (bsc#1111666).
- integrity: remove redundant initialization of variable ret (git-fixes).
- io-mapping: indicate mapping failure (git-fixes).
- ip6_gre: fix null-ptr-deref in ip6gre_init_net() (git-fixes).
- ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() (networking-stable-20_06_28).
- ip6_tunnel: allow not to count pkts on tstats by passing dev as NULL (bsc#1175515).
- ip_tunnel: allow not to count pkts on tstats by setting skb's dev to NULL (bsc#1175515).
- ip_tunnel: Emit events for post-register MTU changes (git-fixes).
- ip_tunnel: fix use-after-free in ip_tunnel_lookup() (networking-stable-20_06_28).
- ip_tunnel: restore binding to ifaces with a large mtu (git-fixes).
- ipv4: fill fl4_icmp_{type,code} in ping_v4_sendmsg (networking-stable-20_07_17).
- ipv4: Silence suspicious RCU usage warning (git-fixes).
- ipv6: fix memory leaks on IPV6_ADDRFORM path (git-fixes).
- ipvlan: fix device features (git-fixes).
- ipvs: allow connection reuse for unconfirmed conntrack (git-fixes).
- ipvs: fix refcount usage for conns in ops mode (git-fixes).
- ipvs: fix the connection sync failed in some cases (bsc#1174699).
- irqchip/gic: Atomically update affinity (bsc#1111666).
- iwlegacy: Check the return value of pcie_capability_read_*() (bsc#1111666).
- jbd2: add the missing unlock_buffer() in the error path of jbd2_write_superblock() (bsc#1175772).
- kabi: genetlink: remove genl_bind (kabi).
- kabi: hide new parameter of ip6_dst_lookup_flow() (bsc#1165629).
- kabi: mask changes to struct ipv6_stub (bsc#1165629).
- kernel/cpu_pm: Fix uninitted local in cpu_pm (git fixes (kernel/pm)).
- kernel-docs: Change Requires on python-Sphinx to earlier than version 3 References: bsc#1166965 From 3 on the internal API that the build system uses was rewritten in an incompatible way. See https://github.com/sphinx-doc/sphinx/issues/7421 and https://bugzilla.suse.com/show_bug.cgi?id=1166965#c16 for some details.
- kernel/relay.c: fix memleak on destroy relay channel (git-fixes).
- kernfs: do not call fsnotify() with name without a parent (bsc#1175770).
- KVM: arm64: Ensure 'params' is initialised when looking up sys register (bsc#1133021).
- KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART (bsc#1133021).
- KVM: arm/arm64: Fix young bit from mmu notifier (bsc#1133021).
- KVM: arm/arm64: vgic: Do not rely on the wrong pending table (bsc#1133021).
- KVM: arm/arm64: vgic-its: Fix restoration of unmapped collections (bsc#1133021).
- KVM: arm: Fix DFSR setting for non-LPAE aarch32 guests (bsc#1133021).
- KVM: arm: Make inject_abt32() inject an external abort instead (bsc#1133021).
- KVM: Change offset in kvm_write_guest_offset_cached to unsigned (bsc#1133021).
- KVM: Check for a bad hva before dropping into the ghc slow path (bsc#1133021).
- KVM: PPC: Book3S PR: Remove uninitialized_var() usage (bsc#1065729).
- KVM: SVM: fix svn_pin_memory()'s use of get_user_pages_fast() (bsc#1112178).
- l2tp: remove skb_dst_set() from l2tp_xmit_skb() (networking-stable-20_07_17).
- leds: 88pm860x: fix use-after-free on unbind (git-fixes).
- leds: core: Flush scheduled work for system suspend (git-fixes).
- leds: da903x: fix use-after-free on unbind (git-fixes).
- leds: lm3533: fix use-after-free on unbind (git-fixes).
- leds: lm355x: avoid enum conversion warning (git-fixes).
- leds: wm831x-status: fix use-after-free on unbind (git-fixes).
- lib/dim: Fix -Wunused-const-variable warnings (bsc#1174852).
- lib: dimlib: fix help text typos (bsc#1174852).
- lib: logic_pio: Add logic_pio_unregister_range() (bsc#1174658).
- lib: logic_pio: Avoid possible overlap for unregistering regions (bsc#1174658).
- lib: logic_pio: Fix RCU usage (bsc#1174658).
- linux/dim: Add completions count to dim_sample (bsc#1174852).
- linux/dim: Fix overflow in dim calculation (bsc#1174852).
- linux/dim: Move implementation to .c files (bsc#1174852).
- linux/dim: Move logic to dim.h (bsc#1174852).
- linux/dim: Remove 'net' prefix from internal DIM members (bsc#1174852).
- linux/dim: Rename externally exposed macros (bsc#1174852).
- linux/dim: Rename externally used net_dim members (bsc#1174852).
- linux/dim: Rename net_dim_sample() to net_dim_update_sample() (bsc#1174852).
- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).
- llc: make sure applications use ARPHRD_ETHER (networking-stable-20_07_17).
- mac80211: mesh: Free ie data when leaving mesh (git-fixes).
- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).
- MAINTAINERS: add entry for Dynamic Interrupt Moderation (bsc#1174852).
- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (git-fixes).
- md/raid5: Fix Force reconstruct-write io stuck in degraded raid5 (git-fixes).
- media: budget-core: Improve exception handling in budget_register() (git-fixes).
- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).
- media: firewire: Using uninitialized values in node_probe() (git-fixes).
- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).
- media: vpss: clean up resources in init (git-fixes).
- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).
- mfd: dln2: Run event handler loop under spinlock (git-fixes).
- mfd: rk808: Fix RK818 ID template (bsc#1175412).
- mld: fix memory leak in ipv6_mc_destroy_dev() (networking-stable-20_06_28).
- mm: filemap: clear idle flag for writes (bsc#1175769).
- mm/migrate.c: add missing flush_dcache_page for non-mapped page migrate (git fixes (mm/migrate)).
- mm/mmu_notifier: use hlist_add_head_rcu() (git fixes (mm/mmu_notifiers)).
- mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() (git fixes (mm/compaction)).
- mm/rmap.c: do not reuse anon_vma if we just want a copy (git fixes (mm/rmap)).
- mm/shmem.c: cast the type of unmap_start to u64 (git fixes (mm/shmem)).
- mm, thp: fix defrag setting if newline is not used (git fixes (mm/thp)).
- mm, vmstat: reduce zone->lock holding time by /proc/pagetypeinfo (bsc#1175691).
- mm/vunmap: add cond_resched() in vunmap_pmd_range (bsc#1175654 ltc#184617).
- mtd: spi-nor: Fix an error code in spi_nor_read_raw() (bsc#1175413).
- mtd: spi-nor: fix kernel-doc for spi_nor::info (bsc#1175414).
- mtd: spi-nor: fix kernel-doc for spi_nor::reg_proto (bsc#1175415).
- mtd: spi-nor: fix silent truncation in spi_nor_read_raw() (bsc#1175416).
- mwifiex: Prevent memory corruption handling keys (git-fixes).
- net: Added pointer check for dst->ops->neigh_lookup in dst_neigh_lookup_skb (git-fixes).
- net: bridge: enfore alignment for ethernet address (networking-stable-20_06_28).
- net: core: reduce recursion limit value (networking-stable-20_06_28).
- net: Do not clear the sock TX queue in sk_set_socket() (networking-stable-20_06_28).
- net: dsa: b53: check for timeout (git-fixes).
- net: ena: Add first_interrupt field to napi struct (bsc#1174852).
- net: ena: add reserved PCI device ID (bsc#1174852).
- net: ena: add support for reporting of packet drops (bsc#1174852).
- net: ena: add support for the rx offset feature (bsc#1174852).
- net: ena: add support for traffic mirroring (bsc#1174852).
- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).
- net: ena: allow setting the hash function without changing the key (bsc#1174852).
- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).
- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).
- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).
- net: ena: change num_queues to num_io_queues for clarity and consistency (bsc#1174852).
- net: ena: changes to RSS hash key allocation (bsc#1174852).
- net: ena: Change WARN_ON expression in ena_del_napi_in_range() (bsc#1174852).
- net: ena: clean up indentation issue (bsc#1174852).
- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).
- net: ena: cosmetic: code reorderings (bsc#1174852).
- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).
- net: ena: cosmetic: fix line break issues (bsc#1174852).
- net: ena: cosmetic: fix spacing issues (bsc#1174852).
- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).
- net: ena: cosmetic: minor code changes (bsc#1174852).
- net: ena: cosmetic: remove unnecessary code (bsc#1174852).
- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).
- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).
- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).
- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).
- net: ena: drop superfluous prototype (bsc#1174852).
- net: ena: enable support of rss hash key and function changes (bsc#1174852).
- net: ena: enable the interrupt_moderation in driver_supported_features (bsc#1174852).
- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).
- net: ena: ethtool: get_channels: use combined only (bsc#1174852).
- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).
- net: ena: ethtool: support set_channels callback (bsc#1174852).
- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).
- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).
- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).
- net: ena: fix incorrect setting of the number of msix vectors (bsc#1174852).
- net: ena: fix incorrect update of intr_delay_resolution (bsc#1174852).
- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).
- net: ena: fix update of interrupt moderation register (bsc#1174852).
- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).
- net: ena: implement XDP drop support (bsc#1174852).
- net: ena: Implement XDP_TX action (bsc#1174852).
- net: ena: make ethtool -l show correct max number of queues (bsc#1174852).
- net: ena: Make missed_tx stat incremental (bsc#1083548).
- net: ena: Make some functions static (bsc#1174852).
- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).
- net: ena: multiple queue creation related cleanups (bsc#1174852).
- net: ena: Prevent reset after device destruction (bsc#1083548).
- net: ena: reduce driver load time (bsc#1174852).
- net: ena: remove all old adaptive rx interrupt moderation code from ena_com (bsc#1174852).
- net: ena: remove code duplication in ena_com_update_nonadaptive_moderation_interval _*() (bsc#1174852).
- net: ena: remove code that does nothing (bsc#1174852).
- net: ena: remove ena_restore_ethtool_params() and relevant fields (bsc#1174852).
- net: ena: remove old adaptive interrupt moderation code from ena_netdev (bsc#1174852).
- net: ena: remove redundant print of number of queues (bsc#1174852).
- net: ena: remove set but not used variable 'hash_key' (bsc#1174852).
- net: ena: remove set but not used variable 'rx_ring' (bsc#1174852).
- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).
- net: ena: Select DIMLIB for ENA_ETHERNET (bsc#1174852).
- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).
- net: ena: support new LLQ acceleration mode (bsc#1174852).
- net: ena: switch to dim algorithm for rx adaptive interrupt moderation (bsc#1174852).
- net: ena: use explicit variable size for clarity (bsc#1174852).
- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).
- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1174852).
- net: ena: xdp: XDP_TX: fix memory leak (bsc#1174852).
- net: ethernet: aquantia: Fix wrong return value (git-fixes).
- net: ethernet: broadcom: have drivers select DIMLIB as needed (bsc#1174852).
- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).
- net: fec: correct the error path for regulator disable in probe (git-fixes).
- netfilter: x_tables: add counters allocation wrapper (git-fixes).
- netfilter: x_tables: cap allocations at 512 mbyte (git-fixes).
- netfilter: x_tables: limit allocation requests for blob rule heads (git-fixes).
- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)
- net: fix memleak in register_netdevice() (networking-stable-20_06_28).
- net: Fix the arp error in some cases (networking-stable-20_06_28).
- net: gre: recompute gre csum for sctp over gre tunnels (git-fixes).
- net: hns3: add autoneg and change speed support for fibre port (bsc#1174070).
- net: hns3: add support for FEC encoding control (bsc#1174070).
- net: hns3: add support for multiple media type (bsc#1174070).
- net: hns3: fix a not link up issue when fibre port supports autoneg (bsc#1174070).
- net: hns3: fix for FEC configuration (bsc#1174070).
- net: hns3: fix port capbility updating issue (bsc#1174070).
- net: hns3: fix port setting handle for fibre port (bsc#1174070).
- net: hns3: fix selftest fail issue for fibre port with autoneg on (bsc#1174070).
- net: hns3: restore the MAC autoneg state after reset (bsc#1174070).
- net: increment xmit_recursion level in dev_direct_xmit() (networking-stable-20_06_28).
- net: ip6_gre: Request headroom in __gre6_xmit() (git-fixes).
- net: lan78xx: add missing endpoint sanity check (git-fixes).
- net: lan78xx: fix transfer-buffer memory leak (git-fixes).
- net: make symbol 'flush_works' static (git-fixes).
- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).
- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).
- net: netsec: Fix signedness bug in netsec_probe() (bsc#1175417).
- net: netsec: initialize tx ring on ndo_open (bsc#1175418).
- net: phy: Check harder for errors in get_phy_id() (bsc#1111666).
- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).
- net: Set fput_needed iff FDPUT_FPUT is set (git-fixes).
- net: socionext: Fix a signedness bug in ave_probe() (bsc#1175419).
- net: socionext: replace napi_alloc_frag with the netdev variant on init (bsc#1175420).
- net: spider_net: Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- net: stmmac: dwmac1000: provide multicast filter fallback (git-fixes).
- net: stmmac: Fix RX packet size > 8191 (git-fixes).
- net: udp: Fix wrong clean up for IS_UDPLITE macro (git-fixes).
- net: update net_dim documentation after rename (bsc#1174852).
- net: usb: ax88179_178a: fix packet alignment padding (networking-stable-20_06_28).
- net: usb: qmi_wwan: add support for Quectel EG95 LTE modem (networking-stable-20_07_17).
- netvsc: unshare skb in VF rx handler (git-fixes).
- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).
- NTB: Fix an error in get link status (git-fixes).
- ntb_netdev: fix sleep time mismatch (git-fixes).
- NTB: ntb_transport: Use scnprintf() for avoiding potential buffer overflow (git-fixes).
- nvme: fix possible deadlock when I/O is blocked (git-fixes).
- nvme-multipath: do not fall back to __nvme_find_path() for non-optimized paths (bsc#1172108).
- nvme-multipath: fix logic for non-optimized paths (bsc#1172108).
- nvme-multipath: round-robin: eliminate 'fallback' variable (bsc#1172108).
- nvme: multipath: round-robin: fix single non-optimized path case (bsc#1172108).
- obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).
- ocfs2: add trimfs dlm lock resource (bsc#1175228).
- ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: change slot number type s16 to u16 (bsc#1175786).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: fix remounting needed after setfacl command (bsc#1173954).
- ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).
- ocfs2: fix value of OCFS2_INVALID_SLOT (bsc#1175767).
- ocfs2: load global_inode_alloc (bsc#1172963).
- ocfs2: load global_inode_alloc (bsc#1172963).
- omapfb: dss: Fix max fclk divider for omap36xx (bsc#1113956)
- openvswitch: Prevent kernel-infoleak in ovs_ct_put_key() (git-fixes).
- PCI/ASPM: Add missing newline in sysfs 'policy' (git-fixes).
- PCI: dwc: Move interrupt acking into the proper callback (bsc#1175666).
- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).
- PCI: Fix 'try' semantics of bus and slot reset (git-fixes).
- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).
- PCI: hv: Fix a timing issue which causes kdump to fail occasionally (bsc#1172871, bsc#1172872, git-fixes).
- PCI: Release IVRS table in AMD ACS quirk (git-fixes).
- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).
- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).
- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).
- pinctrl: single: fix function name in documentation (git-fixes).
- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).
- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).
- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).
- PM / CPU: replace raw_notifier with atomic_notifier (git fixes (kernel/pm)).
- PM / devfreq: rk3399_dmc: Add missing of_node_put() (bsc#1175668).
- PM / devfreq: rk3399_dmc: Disable devfreq-event device when fails.
- PM / devfreq: rk3399_dmc: Fix kernel oops when rockchip,pmu is absent (bsc#1175668).
- PM: sleep: core: Fix the handling of pending runtime resume requests (git-fixes).
- powerpc/64s: Do not init FSCR_DSCR in __init_FSCR() (bsc#1065729).
- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).
- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).
- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).
- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).
- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).
- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).
- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).
- powerpc/perf: Fix missing is_sier_aviable() during build (bsc#1065729).
- powerpc/pseries: Do not initiate shutdown when system is running on UPS (bsc#1175440 ltc#187574).
- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).
- powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU death (bsc#1085030 ltC#165630).
- powerpc/pseries: PCIE PHB reset (bsc#1174689).
- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).
- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).
- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).
- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).
- propagate_one(): mnt_set_mountpoint() needs mount_lock (bsc#1174841).
- pseries: Fix 64 bit logical memory block panic (bsc#1065729).
- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).
- rds: Prevent kernel-infoleak in rds_notify_queue_get() (git-fixes).
- regulator: gpio: Honor regulator-boot-on property (git-fixes).
- Revert 'ALSA: hda: call runtime_allow() for all hda controllers' (bsc#1111666).
- Revert 'drm/amdgpu: Fix NULL dereference in dpm sysfs handlers' (bsc#1113956) * refresh for context changes
- Revert 'ocfs2: avoid inode removal while nfsd is accessing it' This reverts commit 9e096c72476eda333a9998ff464580c00ff59c83.
- Revert 'ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).' This reverts commit 0bf6e248f93736b3f17f399b4a8f64ffa30d371e.
- Revert 'ocfs2: load global_inode_alloc (bsc#1172963).' This reverts commit fc476497b53f967dc615b9cbad9427ba3107b5c4.
- Revert 'scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe' (bsc#1171688 bsc#1174003).
- Revert 'scsi: qla2xxx: Fix crash on qla2x00_mailbox_command' (bsc#1171688 bsc#1174003).
- Revert 'sign also s390x kernel images (bsc#1163524)' This reverts commit b38b61155f0a2c3ebca06d4bb0c2e11a19a87f1f.
- Revert 'xen/balloon: Fix crash when ballooning on x86 32 bit PAE' (bsc#1065600).
- rocker: fix incorrect error handling in dma_rings_init (networking-stable-20_06_28).
- rpm/check-for-config-changes: Ignore CONFIG_CC_VERSION_TEXT
- rpm/check-for-config-changes: Ignore CONFIG_LD_VERSION
- rpm/constraints.in: Increase memory for kernel-docs References: https://build.opensuse.org/request/show/792664
- rpm: drop execute permissions on source files Sometimes a source file with execute permission appears in upstream repository and makes it into our kernel-source packages. This is caught by OBS build checks and may even result in build failures. Sanitize the source tree by removing execute permissions from all C source and header files.
- rpm/kabi.pl: account for namespace field being moved last Upstream is moving the namespace field in Module.symvers last in order to preserve backwards compatibility with kmod tools (depmod, etc). Fix the kabi.pl script to expect the namespace field last. Since split() ignores trailing empty fields and delimeters, switch to using tr to count how many fields/tabs are in a line. Also, in load_symvers(), pass LIMIT of -1 to split() so it does not strip trailing empty fields, as namespace is an optional field.
- rpm/kernel-binary.spec.in: do not run klp-symbols for configs with no modules Starting with 5.8-rc1, s390x/zfcpdump builds fail because rpm/klp-symbols script does not find .tmp_versions directory. This is missing because s390x/zfcpdump is built without modules (CONFIG_MODULES disabled). As livepatching cannot work without modules, the cleanest solution is setting %klp_symbols to 0 if CONFIG_MODULES is disabled. (We cannot simply add another condition to the place where %klp_symbols is set as it can be already set to 1 from prjconf.)
- rpm/kernel-binary.spec.in: restrict livepatch metapackage to default flavor It has been reported that the kernel-*-livepatch metapackage got erroneously enabled for SLE15-SP3's new -preempt flavor, leading to a unresolvable dependency to a non-existing kernel-livepatch-x.y.z-preempt package. As SLE12 and SLE12-SP1 have run out of livepatching support, the need to build said metapackage for the -xen flavor is gone and the only remaining flavor for which they're still wanted is -default. Restrict the build of the kernel-*-livepatch metapackage to the -default flavor.
- rpm/kernel-obs-build.spec.in: add dm-crypt for building with cryptsetup Co-Authored-By: Adam Spiers <aspiers@suse.com>
- rpm/kernel-obs-build.spec.in: Enable overlayfs Overlayfs is needed for podman or docker builds when no more specific driver can be used (like lvm or btrfs). As the default build fs is ext4 currently, we need overlayfs kernel modules to be available.
- rpm/kernel-source.spec.in: Add obsolete_rebuilds (boo#1172073).
- rpm/mkspec-dtb: add mt76 based dtb package
- rpm/package-descriptions: garbege collection remove old ARM and Xen flavors.
- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).
- s390, dcssblk: kaddr and pfn can be NULL to ->direct_access() (bsc#1174873).
- sched: consistently handle layer3 header accesses in the presence of VLANs (networking-stable-20_07_17).
- sched/deadline: Initialize ->dl_boosted (bsc#1112178).
- scsi: dh: Add Fujitsu device to devinfo and dh lists (bsc#1174026).
- scsi: Fix trivial spelling (bsc#1171688 bsc#1174003).
- scsi: lpfc: Add and rename a whole bunch of function parameter descriptions (bsc#1171558 bsc#1136666).
- scsi: lpfc: Add description for lpfc_release_rpi()'s 'ndlpl param (bsc#1171558 bsc#1136666).
- scsi: lpfc: Add missing misc_deregister() for lpfc_init() (bsc#1171558 bsc#1136666).
- scsi: lpfc: Ensure variable has the same stipulations as code using it (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix a bunch of kerneldoc misdemeanors (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix FCoE speed reporting (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix kerneldoc parameter formatting/misnaming/missing issues (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix LUN loss after cable pull (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix no message shown for lpfc_hdw_queue out of range value (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix oops when unloading driver while running mds diags (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix retry of PRLI when status indicates its unsupported (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix RSCN timeout due to incorrect gidft counter (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix some function parameter descriptions (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix typo in comment for ULP (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix-up around 120 documentation issues (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix-up formatting/docrot where appropriate (bsc#1171558 bsc#1136666).
- scsi: lpfc: Fix validation of bsg reply lengths (bsc#1171558 bsc#1136666).
- scsi: lpfc: NVMe remote port devloss_tmo from lldd (bsc#1171558 bsc#1136666 bsc#1173060).
- scsi: lpfc: nvmet: Avoid hang / use-after-free again when destroying targetport (bsc#1171558 bsc#1136666).
- scsi: lpfc: Provide description for lpfc_mem_alloc()'s 'align' param (bsc#1171558 bsc#1136666).
- scsi: lpfc: Quieten some printks (bsc#1171558 bsc#1136666).
- scsi: lpfc: Remove unused variable 'pg_addr' (bsc#1171558 bsc#1136666).
- scsi: lpfc: Update lpfc version to 12.8.0.3 (bsc#1171558 bsc#1136666).
- scsi: lpfc: Use __printf() format notation (bsc#1171558 bsc#1136666).
- scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Address a set of sparse warnings (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change {RD,WRT}_REG_*() function names from upper case into lower case (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in header files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in source files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix issue with adapter's stopping state (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix login timeout (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix null pointer access during disconnect from subsystem (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix spelling of a variable name (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix warning after FC target reset (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush all sessions on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush I/O on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Initialize 'n' before using it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce noisy debug message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove an unused function (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove a superfluous cast (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: SAN congestion management implementation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use register names instead of register offsets (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for ha->fw_dumped (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1171688 bsc#1174003).
- scsi: smartpqi: add bay identifier (bsc#1172418).
- scsi: smartpqi: add gigabyte controller (bsc#1172418).
- scsi: smartpqi: add id support for SmartRAID 3152-8i (bsc#1172418).
- scsi: smartpqi: add inquiry timeouts (bsc#1172418).
- scsi: smartpqi: add module param for exposure order (bsc#1172418).
- scsi: smartpqi: add module param to hide vsep (bsc#1172418).
- scsi: smartpqi: add new pci ids (bsc#1172418).
- scsi: smartpqi: add pci ids for fiberhome controller (bsc#1172418).
- scsi: smartpqi: add RAID bypass counter (bsc#1172418).
- scsi: smartpqi: add sysfs entries (bsc#1172418).
- scsi: smartpqi: Align driver syntax with oob (bsc#1172418).
- scsi: smartpqi: avoid crashing kernel for controller issues (bsc#1172418).
- scsi: smartpqi: bump version (bsc#1172418).
- scsi: smartpqi: bump version (bsc#1172418).
- scsi: smartpqi: bump version to 1.2.16-010 (bsc#1172418).
- scsi: smartpqi: change TMF timeout from 60 to 30 seconds (bsc#1172418).
- scsi: smartpqi: correct hang when deleting 32 lds (bsc#1172418).
- scsi: smartpqi: correct REGNEWD return status (bsc#1172418).
- scsi: smartpqi: correct syntax issue (bsc#1172418).
- scsi: smartpqi: fix call trace in device discovery (bsc#1172418).
- scsi: smartpqi: fix controller lockup observed during force reboot (bsc#1172418).
- scsi: smartpqi: fix LUN reset when fw bkgnd thread is hung (bsc#1172418).
- scsi: smartpqi: fix problem with unique ID for physical device (bsc#1172418).
- scsi: smartpqi: identify physical devices without issuing INQUIRY (bsc#1172418).
- scsi: smartpqi: properly set both the DMA mask and the coherent DMA mask (bsc#1172418).
- scsi: smartpqi: remove unused manifest constants (bsc#1172418).
- scsi: smartpqi: Reporting unhandled SCSI errors (bsc#1172418).
- scsi: smartpqi: support device deletion via sysfs (bsc#1172418).
- scsi: smartpqi: update copyright (bsc#1172418).
- scsi: smartpqi: update logical volume size after expansion (bsc#1172418).
- scsi: smartpqi: Use scnprintf() for avoiding potential buffer overflow (bsc#1172418).
- scsi: storvsc: Correctly set number of hardware queues for IDE disk (git-fixes).
- scsi: target/iblock: fix WRITE SAME zeroing (bsc#1169790).
- sctp: Do not advertise IPv4 addresses if ipv6only is set on the socket (networking-stable-20_06_28).
- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).
- serial: 8250: change lock order in serial8250_do_startup() (git-fixes).
- serial: pl011: Do not leak amba_ports entry on driver register error (git-fixes).
- serial: pl011: Fix oops on -EPROBE_DEFER (git-fixes).
- Set VIRTIO_CONSOLE=y (bsc#1175667).
- sign also s390x kernel images (bsc#1163524)
- soc: fsl: qbman: allow registering a device link for the portal user (bsc#1174550).
- soc: fsl: qbman_portals: add APIs to retrieve the probing status (bsc#1174550).
- spi: davinci: Remove uninitialized_var() usage (git-fixes).
- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).
- spi: nxp-fspi: Ensure width is respected in spi-mem operations (bsc#1175421).
- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1175422).
- spi: spi-mem: export spi_mem_default_supports_op() (bsc#1175421).
- tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT (networking-stable-20_06_28).
- tcp: grow window for OOO packets only for SACK flows (networking-stable-20_06_28).
- tcp: make sure listeners do not initialize congestion-control state (networking-stable-20_07_17).
- tcp: md5: add missing memory barriers in tcp_md5_do_add()/tcp_md5_hash_key() (networking-stable-20_07_17).
- tcp: md5: do not send silly options in SYNCOOKIES (networking-stable-20_07_17).
- tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key() barriers (networking-stable-20_07_17).
- tracepoint: Mark __tracepoint_string's __used (git-fixes).
- tracing: Use trace_sched_process_free() instead of exit() for pid tracing (git-fixes).
- tty: serial: fsl_lpuart: add imx8qxp support (bsc#1175670).
- tty: serial: fsl_lpuart: free IDs allocated by IDA (bsc#1175670).
- USB: cdc-acm: rework notification_buffer resizing (git-fixes).
- USB: gadget: f_tcm: Fix some resource leaks in some error paths (git-fixes).
- USB: host: ohci-exynos: Fix error handling in exynos_ohci_probe() (git-fixes).
- USB: Ignore UAS for JMicron JMS567 ATA/ATAPI Bridge (git-fixes).
- USB: iowarrior: fix up report size handling for some devices (git-fixes).
- usbip: tools: fix module name in man page (git-fixes).
- USB: rename USB quirk to USB_QUIRK_ENDPOINT_IGNORE (git-fixes).
- USB: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).
- USB: serial: cp210x: re-enable auto-RTS on open (git-fixes).
- USB: serial: ftdi_sio: clean up receive processing (git-fixes).
- USB: serial: ftdi_sio: fix break and sysrq handling (git-fixes).
- USB: serial: ftdi_sio: make process-packet buffer unsigned (git-fixes).
- USB: serial: iuu_phoenix: fix led-activity helpers (git-fixes).
- USB: serial: qcserial: add EM7305 QDL product ID (git-fixes).
- USB: xhci: define IDs for various ASMedia host controllers (git-fixes).
- USB: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).
- USB: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).
- USB: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).
- VFS: Check rename_lock in lookup_fast() (bsc#1174734).
- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).
- video: pxafb: Fix the function used to balance a 'dma_alloc_coherent()' call (git-fixes).
- vlan: consolidate VLAN parsing code and limit max parsing depth (networking-stable-20_07_17).
- vmxnet3: use correct tcp hdr length when packet is encapsulated (bsc#1175199).
- vt_compat_ioctl(): clean up, use compat_ptr() properly (git-fixes).
- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).
- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (bsc#1111666).
- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (bsc#1111666).
- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (bsc#1111666).
- wl1251: fix always return 0 error (git-fixes).
- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1112178).
- x86/hyperv: Create and use Hyper-V page definitions (git-fixes).
- x86/hyper-v: Fix overflow bug in fill_gva_list() (git-fixes).
- x86/hyperv: Make hv_vcpu_is_preempted() visible (git-fixes).
- x86/mce/inject: Fix a wrong assignment of i_mce.status (bsc#1112178).
- x86/unwind/orc: Fix ORC for newly forked tasks (bsc#1058115).
- xen/balloon: fix accounting in alloc_xenballooned_pages error path (bsc#1065600).
- xen/balloon: make the balloon wait interruptible (bsc#1065600).
- xfrm: check id proto in validate_tmpl() (git-fixes).
- xfrm: clean up xfrm protocol checks (git-fixes).
- xfrm_user: uncoditionally validate esn replay attribute struct (git-fixes).
- xfs: fix inode allocation block res calculation precedence (git-fixes).
- xfs: fix reflink quota reservation accounting error (git-fixes).
- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).
Patchnames
SUSE-2020-2574,SUSE-SLE-HA-12-SP5-2020-2574,SUSE-SLE-Live-Patching-12-SP5-2020-2574,SUSE-SLE-SDK-12-SP5-2020-2574,SUSE-SLE-SERVER-12-SP5-2020-2574,SUSE-SLE-WE-12-SP5-2020-2574
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup (bsc#1165629).\n- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798). \n- CVE-2020-14356: Fixed a null pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213). \n- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205). \n- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).\n- CVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).\n- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).\n\nThe following non-security bugs were fixed:\n\n- ACPI: kABI fixes for subsys exports (bsc#1174968).\n- ACPI / LPSS: Resume BYT/CHT I2C controllers from resume_noirq (bsc#1174968).\n- ACPI / LPSS: Use acpi_lpss_* instead of acpi_subsys_* functions for hibernate (bsc#1174968).\n- ACPI: PM: Introduce \u0027poweroff\u0027 callbacks for ACPI PM domain and LPSS (bsc#1174968).\n- ACPI: PM: Simplify and fix PM domain hibernation callbacks (bsc#1174968).\n- ALSA: core: pcm_iec958: fix kernel-doc (bsc#1111666).\n- ALSA: echoaduio: Drop superfluous volatile modifier (bsc#1111666).\n- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (bsc#1111666).\n- ALSA: hda: Add support for Loongson 7A1000 controller (bsc#1111666).\n- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (bsc#1111666).\n- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (bsc#1111666).\n- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (bsc#1111666).\n- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).\n- ALSA: hda: fix snd_hda_codec_cleanup() documentation (bsc#1111666).\n- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (bsc#1111666).\n- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (bsc#1111666).\n- ALSA: hda/realtek: Add model alc298-samsung-headphone (git-fixes).\n- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for Lenovo Carbon X1 8th gen (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for MSI GL63 (bsc#1111666).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex Book (git-fixes).\n- ALSA: hda/realtek - change to suitable link model for ASUS platform (bsc#1111666).\n- ALSA: hda/realtek - Check headset type by unplug and resume (bsc#1111666).\n- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (bsc#1111666).\n- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (bsc#1111666).\n- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (bsc#1111666).\n- ALSA: hda/realtek: Fix add a \u0027ultra_low_power\u0027 function for intel reference board (alc256) (bsc#1111666).\n- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (bsc#1111666).\n- ALSA: hda/realtek - Fixed HP right speaker no sound (bsc#1111666).\n- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (bsc#1111666).\n- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (bsc#1111666).\n- ALSA: hda/realtek - Fix unused variable warning (bsc#1111666).\n- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (bsc#1111666).\n- ALSA: hda - reverse the setting value in the micmute_led_set (bsc#1111666).\n- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).\n- ALSA: pci: delete repeated words in comments (bsc#1111666).\n- ALSA: seq: oss: Serialize ioctls (bsc#1111666).\n- ALSA: usb-audio: Add capture support for Saffire 6 (USB 1.1) (git-fixes).\n- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (bsc#1111666).\n- ALSA: usb-audio: add startech usb audio dock name (bsc#1111666).\n- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (bsc#1111666).\n- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (bsc#1111666).\n- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (bsc#1111666).\n- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (bsc#1111666).\n- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).\n- ALSA: usb-audio: fix spelling mistake \u0027buss\u0027 -\u003e \u0027bus\u0027 (bsc#1111666).\n- ALSA: usb-audio: ignore broken processing/extension unit (git-fixes).\n- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (bsc#1111666).\n- ALSA: usb/line6: remove \u0027defined but not used\u0027 warning (bsc#1111666).\n- arm64: Add MIDR encoding for HiSilicon Taishan CPUs (bsc#1174547).\n- arm64: Add MIDR encoding for NVIDIA CPUs (bsc#1174547).\n- arm64: add sysfs vulnerability show for meltdown (bsc#1174547).\n- arm64: Add sysfs vulnerability show for spectre-v1 (bsc#1174547).\n- arm64: add sysfs vulnerability show for spectre-v2 (bsc#1174547).\n- arm64: add sysfs vulnerability show for speculative store bypass (bsc#1174547). \n- arm64: Advertise mitigation of Spectre-v2, or lack thereof (bsc#1174547). \n- arm64: Always enable spectre-v2 vulnerability detection (bsc#1174547). \n- arm64: Always enable ssb vulnerability detection (bsc#1174547). \n- arm64: backtrace: Do not bother trying to unwind the userspace stack (bsc#1175397).\n- arm64: capabilities: Add NVIDIA Denver CPU to bp_harden list (bsc#1174547).\n- arm64: capabilities: Merge duplicate Cavium erratum entries (bsc#1174547).\n- arm64: capabilities: Merge entries for ARM64_WORKAROUND_CLEAN_CACHE (bsc#1174547). \n- arm64: cpufeature: Enable Qualcomm Falkor/Kryo errata 1003 (bsc#1175398).\n- arm64: Do not mask out PTE_RDONLY in pte_same() (bsc#1175393).\n- arm64: enable generic CPU vulnerabilites support (bsc#1174547). Update config/arm64/default\n- arm64: Ensure VM_WRITE|VM_SHARED ptes are clean by default (bsc#1175394).\n- arm64: errata: Do not define type field twice for arm64_errata entries (bsc#1174547).\n- arm64: errata: Update stale comment (bsc#1174547).\n- arm64: Get rid of __smccc_workaround_1_hvc_* (bsc#1174547).\n- arm64: kpti: Avoid rewriting early page tables when KASLR is enabled (bsc#1174547).\n- arm64: kpti: Update arm64_kernel_use_ng_mappings() when forced on (bsc#1174547).\n- arm64: kpti: Whitelist Cortex-A CPUs that do not implement the CSV3 field (bsc#1174547).\n- arm64: kpti: Whitelist HiSilicon Taishan v110 CPUs (bsc#1174547).\n- arm64: KVM: Avoid setting the upper 32 bits of VTCR_EL2 to 1 (bsc#1133021).\n- arm64: KVM: Guests can skip __install_bp_hardening_cb()s HYP work (bsc#1174547).\n- arm64: KVM: Use SMCCC_ARCH_WORKAROUND_1 for Falkor BP hardening (bsc#1174547). \n- arm64: mm: Fix pte_mkclean, pte_mkdirty semantics (bsc#1175526). \n- arm64: Provide a command line to disable spectre_v2 mitigation (bsc#1174547).\n- arm64: Silence clang warning on mismatched value/register sizes (bsc#1175396).\n- arm64/speculation: Support \u0027mitigations=\u0027 cmdline option (bsc#1174547). \n- arm64: ssbd: explicitly depend on \u003clinux/prctl.h\u003e (bsc#1175399).\n- arm64: ssbs: Do not treat CPUs with SSBS as unaffected by SSB (bsc#1174547).\n- arm64: ssbs: Fix context-switch when SSBS is present on all CPUs (bsc#1175669).\n- arm64/sve: Fix wrong free for task-\u003ethread.sve_state (bsc#1175400).\n- arm64/sve: \u003cuapi/asm/ptrace.h\u003e should not depend on \u003cuapi/linux/prctl.h\u003e (bsc#1175401).\n- arm64: tlbflush: avoid writing RES0 bits (bsc#1175402).\n- arm64: Use firmware to detect CPUs that are not affected by Spectre-v2 (bsc#1174547).\n- ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17 (bsc#1133021). \n- ARM: KVM: invalidate icache on guest exit for Cortex-A15 (bsc#1133021).\n- ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15 (bsc#1133021).\n- ASoC: hda/tegra: Set buffer alignment to 128 bytes (bsc#1111666).\n- bcache: allocate meta data pages as compound pages (bsc#1172873).\n- bcache: allocate meta data pages as compound pages (bsc#1172873).\n- block: check queue\u0027s limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).\n- block: check queue\u0027s limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).\n- block: Fix use-after-free in blkdev_get() (bsc#1174843).\n- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).\n- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).\n- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (bsc#1111666).\n- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (bsc#1111666).\n- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (bsc#1111666).\n- bonding: fix active-backup failover for current ARP slave (bsc#1174771).\n- bonding: fix a potential double-unregister (git-fixes).\n- bonding: show saner speed for broadcast mode (git-fixes).\n- bpf: Fix map leak in HASH_OF_MAPS map (git-fixes).\n- brcmfmac: keep SDIO watchdog running when console_interval is non-zero (bsc#1111666).\n- brcmfmac: set state of hanger slot to FREE when flushing PSQ (bsc#1111666).\n- brcmfmac: To fix Bss Info flag definition Bug (bsc#1111666).\n- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).\n- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).\n- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).\n- btrfs: fix block group leak when removing fails (bsc#1175149).\n- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).\n- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).\n- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).\n- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).\n- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).\n- btrfs: fix memory leaks after failure to lookup checksums during inode logging (bsc#1175550).\n- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).\n- btrfs: fix race between block group removal and block group creation (bsc#1175149).\n- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).\n- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).\n- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).\n- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).\n- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).\n- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).\n- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).\n- btrfs: Open code btrfs_write_and_wait_marked_extents (bsc#1175149).\n- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).\n- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).\n- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).\n- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).\n- btrfs: Rename and export clear_btree_io_tree (bsc#1175149).\n- btrfs: treat RWF_{,D}SYNC writes as sync for CRCs (bsc#1175493).\n- bus: hisi_lpc: Add .remove method to avoid driver unbind crash (bsc#1174658).\n- bus: hisi_lpc: Do not fail probe for unrecognised child devices (bsc#1174658).\n- bus: hisi_lpc: Unregister logical PIO range to avoid potential use-after-free (bsc#1174658).\n- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).\n- cfg80211: check vendor command doit pointer before use (git-fixes).\n- char: virtio: Select VIRTIO from VIRTIO_CONSOLE (bsc#1175667).\n- cifs: document and cleanup dfs mount (bsc#1144333 bsc#1172428).\n- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1144333 bsc#1172428).\n- cifs: fix double free error on share and prefix (bsc#1144333 bsc#1172428).\n- cifs: handle empty list of targets in cifs_reconnect() (bsc#1144333 bsc#1172428).\n- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1144333 bsc#1172428).\n- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1144333 bsc#1172428).\n- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1144333 bsc#1172428).\n- cifs: reduce number of referral requests in DFS link lookups (bsc#1144333 bsc#1172428).\n- cifs: rename reconn_inval_dfs_target() (bsc#1144333 bsc#1172428).\n- clk: at91: clk-generated: check best_rate against ranges (bsc#1111666).\n- clk: clk-atlas6: fix return value check in atlas6_clk_init() (bsc#1111666).\n- clk: iproc: round clock rate to the closest (bsc#1111666).\n- clk: spear: Remove uninitialized_var() usage (git-fixes).\n- clk: st: Remove uninitialized_var() usage (git-fixes).\n- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1174549\n- console: newport_con: fix an issue about leak related system resources (git-fixes).\n- constrants: fix malformed XML Closing tag of an element is \u0027\u003c/foo\u003e\u0027, not \u0027\u003cfoo/\u003e\u0027. Fixes: 8b37de2eb835 (\u0027rpm/constraints.in: Increase memory for kernel-docs\u0027)\n- Created new preempt kernel flavor (jsc#SLE-11309) Configs are cloned from the respective $arch/default configs. All changed configs appart from CONFIG_PREEMPT-\u003ey are a result of dependencies, namely many lock/unlock primitives are no longer inlined in the preempt kernel. TREE_RCU has been also changed to PREEMPT_RCU which is the default implementation for PREEMPT kernel.\n- crypto: ccp - Fix use of merged scatterlists (git-fixes).\n- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).\n- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).\n- crypto: rockchip - fix scatterlist nents error (git-fixes).\n- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).\n- crypto: talitos - check AES key size (git-fixes).\n- crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK (git-fixes).\n- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- dev: Defer free of skbs in flush_backlog (git-fixes).\n- device property: Fix the secondary firmware node handling in set_primary_fwnode() (git-fixes).\n- devres: keep both device name and resource name in pretty name (git-fixes).\n- dlm: Fix kobject memleak (bsc#1175768).\n- dlm: remove BUG() before panic() (bsc#1174844).\n- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).\n- Documentation/networking: Add net DIM documentation (bsc#1174852).\n- dpaa2-eth: Fix passing zero to \u0027PTR_ERR\u0027 warning (bsc#1175403).\n- dpaa2-eth: free already allocated channels on probe defer (bsc#1175404).\n- dpaa2-eth: prevent array underflow in update_cls_rule() (bsc#1175405).\n- dpaa_eth: add dropped frames to percpu ethtool stats (bsc#1174550).\n- dpaa_eth: add newline in dev_err() msg (bsc#1174550).\n- dpaa_eth: avoid timestamp read on error paths (bsc#1175406).\n- dpaa_eth: change DMA device (bsc#1174550).\n- dpaa_eth: cleanup skb_to_contig_fd() (bsc#1174550).\n- dpaa_eth: defer probing after qbman (bsc#1174550).\n- dpaa_eth: extend delays in ndo_stop (bsc#1174550).\n- dpaa_eth: fix DMA mapping leak (bsc#1174550).\n- dpaa_eth: Fix one possible memleak in dpaa_eth_probe (bsc#1174550).\n- dpaa_eth: FMan erratum A050385 workaround (bsc#1174550).\n- dpaa_eth: perform DMA unmapping before read (bsc#1175407).\n- dpaa_eth: register a device link for the qman portal used (bsc#1174550).\n- dpaa_eth: remove netdev_err() for user errors (bsc#1174550).\n- dpaa_eth: remove redundant code (bsc#1174550).\n- dpaa_eth: simplify variables used in dpaa_cleanup_tx_fd() (bsc#1174550).\n- dpaa_eth: use a page to store the SGT (bsc#1174550).\n- dpaa_eth: use fd information in dpaa_cleanup_tx_fd() (bsc#1174550).\n- dpaa_eth: use only one buffer pool per interface (bsc#1174550).\n- dpaa_eth: use page backed rx buffers (bsc#1174550).\n- driver core: Avoid binding drivers to dead devices (git-fixes).\n- Drivers: hv: balloon: Remove dependencies on guest page size (git-fixes).\n- Drivers: hv: vmbus: Fix virt_to_hvpfn() for X86_PAE (git-fixes).\n- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127, bsc#1175128).\n- Drivers: hv: vmbus: Remove the undesired put_cpu_ptr() in hv_synic_cleanup() (git-fixes).\n- drivers/perf: hisi: Fix typo in events attribute array (bsc#1175408).\n- drivers/perf: hisi: Fixup one DDRC PMU register offset (bsc#1175410).\n- drivers/perf: hisi: Fix wrong value for all counters enable (bsc#1175409).\n- drm: Added orientation quirk for ASUS tablet model T103HAF (bsc#1111666).\n- drm/amd/display: fix pow() crashing when given base 0 (git-fixes).\n- drm/amdgpu: avoid dereferencing a NULL pointer (bsc#1111666).\n- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (bsc#1111666).\n- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (bsc#1113956) \t* refresh for context changes\n- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).\n- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1113956)\n- drm/arm: fix unintentional integer overflow on left shift (git-fixes).\n- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1113956) \t* refreshed for context changes\n- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).\n- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1113956) \t* move drm_mipi_dbi.c -\u003e tinydrm/mipi-drm.c \t* refresh for context changes\n- drm/debugfs: fix plain echo to connector \u0027force\u0027 attribute (bsc#1111666).\n- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).\n- drm/etnaviv: fix ref count leak via pm_runtime_get_sync (bsc#1111666).\n- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (bsc#1112178) \t* updated names of get/put functions\n- drm: hold gem reference until object is no longer accessed (bsc#1113956)\n- drm/imx: fix use after free (git-fixes).\n- drm/imx: imx-ldb: Disable both channels for split mode in enc-\u003edisable() (git-fixes).\n- drm/imx: tve: fix regulator_disable error path (git-fixes).\n- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).\n- drm/msm/adreno: fix updating ring fence (git-fixes).\n- drm/msm: ratelimit crtc event overflow error (bsc#1111666).\n- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).\n- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).\n- drm/nouveau: fix multiple instances of reference count leaks (bsc#1111666).\n- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).\n- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).\n- drm/radeon: disable AGP by default (bsc#1111666).\n- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).\n- drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync (bsc#1111666).\n- drm/rockchip: fix VOP_WIN_GET macro (bsc#1175411).\n- drm/tilcdc: fix leak \u0026 null ref in panel_connector_get_modes (bsc#1111666).\n- drm/ttm/nouveau: do not call tt destroy callback on alloc failure (bsc#1175232).\n- drm/vmwgfx: Fix two list_for_each loop exit tests (bsc#1111666).\n- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (bsc#1111666).\n- drm/xen-front: Fix misused IS_ERR_OR_NULL checks (bsc#1065600).\n- EDAC: Fix reference count leaks (bsc#1112178).\n- efi/memreserve: deal with memreserve entries in unmapped memory (bsc#1174685).\n- ext4: check journal inode extents more carefully (bsc#1173485).\n- ext4: do not allow overlapping system zones (bsc#1173485).\n- ext4: fix checking of directory entry validity for inline directories (bsc#1175771).\n- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1174840).\n- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).\n- fat: do not allow to mount if the FAT length == 0 (bsc#1174845).\n- fbdev: Detect integer underflow at \u0027struct fbcon_ops\u0027-\u003eclear_margins. (bsc#1112178) \t* move files drivers/video/fbdev/core -\u003e drivers/video/console \t* refresh for context changes\n- firmware: google: check if size is valid when decoding VPD data (git-fixes).\n- firmware: google: increment VPD key_len properly (git-fixes).\n- fpga: dfl: fix bug in port reset handshake (git-fixes).\n- fsl/fman: add API to get the device behind a fman port (bsc#1174550).\n- fsl/fman: check dereferencing null pointer (git-fixes).\n- fsl/fman: detect FMan erratum A050385 (bsc#1174550).\n- fsl/fman: do not touch liodn base regs reserved on non-PAMU SoCs (bsc#1174550).\n- fsl/fman: fix dereference null return value (git-fixes).\n- fsl/fman: fix eth hash table allocation (git-fixes).\n- fsl/fman: fix unreachable code (git-fixes).\n- fsl/fman: remove unused struct member (bsc#1174550).\n- fsl/fman: use 32-bit unsigned integer (git-fixes).\n- fuse: fix memleak in cuse_channel_open (bsc#1174926).\n- fuse: fix missing unlock_page in fuse_writepage() (bsc#1174904).\n- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175062).\n- fuse: fix weird page warning (bsc#1175063).\n- fuse: flush dirty data/metadata before non-truncate setattr (bsc#1175064).\n- fuse: truncate pending writes on O_TRUNC (bsc#1175065).\n- fuse: verify attributes (bsc#1175066).\n- fuse: verify nlink (bsc#1175067).\n- genetlink: remove genl_bind (networking-stable-20_07_17).\n- go7007: add sanity checking for endpoints (git-fixes).\n- gpu: host1x: debug: Fix multiple channels emitting messages simultaneously (bsc#1111666).\n- HID: hiddev: fix mess in hiddev_open() (git-fixes).\n- HISI LPC: Re-Add ACPI child enumeration support (bsc#1174658).\n- HISI LPC: Stop using MFD APIs (bsc#1174658).\n- hv_balloon: Balloon up according to request page number (git-fixes).\n- hv_balloon: Use a static page for the balloon_up send buffer (git-fixes).\n- hv_netvsc: Allow scatter-gather feature to be tunable (git-fixes).\n- hv_netvsc: do not use VF device if link is down (git-fixes).\n- hv_netvsc: Fix a warning of suspicious RCU usage (git-fixes).\n- hv_netvsc: Fix error handling in netvsc_attach() (git-fixes).\n- hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (git-fixes).\n- hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (git-fixes).\n- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (git-fixes).\n- hv_netvsc: flag software created hash value (git-fixes).\n- hv_netvsc: Remove \u0027unlikely\u0027 from netvsc_select_queue (git-fixes).\n- i2c: rcar: in slave mode, clear NACK earlier (git-fixes).\n- i2c: rcar: slave: only send STOP event when we have been addressed (bsc#1111666).\n- i40e: Fix crash during removing i40e driver (git-fixes).\n- i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (git-fixes).\n- ibmveth: Fix use of ibmveth in a bridge (bsc#1174387 ltc#187506).\n- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).\n- ibmvnic fix NULL tx_pools and rx_tools issue at do_reset (bsc#1175873 ltc#187922).\n- include/linux/poison.h: remove obsolete comment (git fixes (poison)).\n- Input: psmouse - add a newline when printing \u0027proto\u0027 by sysfs (git-fixes).\n- Input: sentelic - fix error return when fsp_reg_write fails (bsc#1111666).\n- integrity: remove redundant initialization of variable ret (git-fixes).\n- io-mapping: indicate mapping failure (git-fixes).\n- ip6_gre: fix null-ptr-deref in ip6gre_init_net() (git-fixes).\n- ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() (networking-stable-20_06_28).\n- ip6_tunnel: allow not to count pkts on tstats by passing dev as NULL (bsc#1175515).\n- ip_tunnel: allow not to count pkts on tstats by setting skb\u0027s dev to NULL (bsc#1175515).\n- ip_tunnel: Emit events for post-register MTU changes (git-fixes).\n- ip_tunnel: fix use-after-free in ip_tunnel_lookup() (networking-stable-20_06_28).\n- ip_tunnel: restore binding to ifaces with a large mtu (git-fixes).\n- ipv4: fill fl4_icmp_{type,code} in ping_v4_sendmsg (networking-stable-20_07_17).\n- ipv4: Silence suspicious RCU usage warning (git-fixes).\n- ipv6: fix memory leaks on IPV6_ADDRFORM path (git-fixes).\n- ipvlan: fix device features (git-fixes).\n- ipvs: allow connection reuse for unconfirmed conntrack (git-fixes).\n- ipvs: fix refcount usage for conns in ops mode (git-fixes).\n- ipvs: fix the connection sync failed in some cases (bsc#1174699).\n- irqchip/gic: Atomically update affinity (bsc#1111666).\n- iwlegacy: Check the return value of pcie_capability_read_*() (bsc#1111666).\n- jbd2: add the missing unlock_buffer() in the error path of jbd2_write_superblock() (bsc#1175772).\n- kabi: genetlink: remove genl_bind (kabi).\n- kabi: hide new parameter of ip6_dst_lookup_flow() (bsc#1165629).\n- kabi: mask changes to struct ipv6_stub (bsc#1165629).\n- kernel/cpu_pm: Fix uninitted local in cpu_pm (git fixes (kernel/pm)).\n- kernel-docs: Change Requires on python-Sphinx to earlier than version 3 References: bsc#1166965 From 3 on the internal API that the build system uses was rewritten in an incompatible way. See https://github.com/sphinx-doc/sphinx/issues/7421 and https://bugzilla.suse.com/show_bug.cgi?id=1166965#c16 for some details.\n- kernel/relay.c: fix memleak on destroy relay channel (git-fixes).\n- kernfs: do not call fsnotify() with name without a parent (bsc#1175770).\n- KVM: arm64: Ensure \u0027params\u0027 is initialised when looking up sys register (bsc#1133021).\n- KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART (bsc#1133021).\n- KVM: arm/arm64: Fix young bit from mmu notifier (bsc#1133021).\n- KVM: arm/arm64: vgic: Do not rely on the wrong pending table (bsc#1133021).\n- KVM: arm/arm64: vgic-its: Fix restoration of unmapped collections (bsc#1133021).\n- KVM: arm: Fix DFSR setting for non-LPAE aarch32 guests (bsc#1133021).\n- KVM: arm: Make inject_abt32() inject an external abort instead (bsc#1133021).\n- KVM: Change offset in kvm_write_guest_offset_cached to unsigned (bsc#1133021).\n- KVM: Check for a bad hva before dropping into the ghc slow path (bsc#1133021).\n- KVM: PPC: Book3S PR: Remove uninitialized_var() usage (bsc#1065729).\n- KVM: SVM: fix svn_pin_memory()\u0027s use of get_user_pages_fast() (bsc#1112178).\n- l2tp: remove skb_dst_set() from l2tp_xmit_skb() (networking-stable-20_07_17).\n- leds: 88pm860x: fix use-after-free on unbind (git-fixes).\n- leds: core: Flush scheduled work for system suspend (git-fixes).\n- leds: da903x: fix use-after-free on unbind (git-fixes).\n- leds: lm3533: fix use-after-free on unbind (git-fixes).\n- leds: lm355x: avoid enum conversion warning (git-fixes).\n- leds: wm831x-status: fix use-after-free on unbind (git-fixes).\n- lib/dim: Fix -Wunused-const-variable warnings (bsc#1174852).\n- lib: dimlib: fix help text typos (bsc#1174852).\n- lib: logic_pio: Add logic_pio_unregister_range() (bsc#1174658).\n- lib: logic_pio: Avoid possible overlap for unregistering regions (bsc#1174658).\n- lib: logic_pio: Fix RCU usage (bsc#1174658).\n- linux/dim: Add completions count to dim_sample (bsc#1174852).\n- linux/dim: Fix overflow in dim calculation (bsc#1174852).\n- linux/dim: Move implementation to .c files (bsc#1174852).\n- linux/dim: Move logic to dim.h (bsc#1174852).\n- linux/dim: Remove \u0027net\u0027 prefix from internal DIM members (bsc#1174852).\n- linux/dim: Rename externally exposed macros (bsc#1174852).\n- linux/dim: Rename externally used net_dim members (bsc#1174852).\n- linux/dim: Rename net_dim_sample() to net_dim_update_sample() (bsc#1174852).\n- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).\n- llc: make sure applications use ARPHRD_ETHER (networking-stable-20_07_17).\n- mac80211: mesh: Free ie data when leaving mesh (git-fixes).\n- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).\n- MAINTAINERS: add entry for Dynamic Interrupt Moderation (bsc#1174852).\n- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (git-fixes).\n- md/raid5: Fix Force reconstruct-write io stuck in degraded raid5 (git-fixes).\n- media: budget-core: Improve exception handling in budget_register() (git-fixes).\n- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).\n- media: firewire: Using uninitialized values in node_probe() (git-fixes).\n- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).\n- media: vpss: clean up resources in init (git-fixes).\n- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).\n- mfd: dln2: Run event handler loop under spinlock (git-fixes).\n- mfd: rk808: Fix RK818 ID template (bsc#1175412).\n- mld: fix memory leak in ipv6_mc_destroy_dev() (networking-stable-20_06_28).\n- mm: filemap: clear idle flag for writes (bsc#1175769).\n- mm/migrate.c: add missing flush_dcache_page for non-mapped page migrate (git fixes (mm/migrate)).\n- mm/mmu_notifier: use hlist_add_head_rcu() (git fixes (mm/mmu_notifiers)).\n- mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() (git fixes (mm/compaction)).\n- mm/rmap.c: do not reuse anon_vma if we just want a copy (git fixes (mm/rmap)).\n- mm/shmem.c: cast the type of unmap_start to u64 (git fixes (mm/shmem)).\n- mm, thp: fix defrag setting if newline is not used (git fixes (mm/thp)).\n- mm, vmstat: reduce zone-\u003elock holding time by /proc/pagetypeinfo (bsc#1175691).\n- mm/vunmap: add cond_resched() in vunmap_pmd_range (bsc#1175654 ltc#184617).\n- mtd: spi-nor: Fix an error code in spi_nor_read_raw() (bsc#1175413).\n- mtd: spi-nor: fix kernel-doc for spi_nor::info (bsc#1175414).\n- mtd: spi-nor: fix kernel-doc for spi_nor::reg_proto (bsc#1175415).\n- mtd: spi-nor: fix silent truncation in spi_nor_read_raw() (bsc#1175416).\n- mwifiex: Prevent memory corruption handling keys (git-fixes).\n- net: Added pointer check for dst-\u003eops-\u003eneigh_lookup in dst_neigh_lookup_skb (git-fixes).\n- net: bridge: enfore alignment for ethernet address (networking-stable-20_06_28).\n- net: core: reduce recursion limit value (networking-stable-20_06_28).\n- net: Do not clear the sock TX queue in sk_set_socket() (networking-stable-20_06_28).\n- net: dsa: b53: check for timeout (git-fixes).\n- net: ena: Add first_interrupt field to napi struct (bsc#1174852).\n- net: ena: add reserved PCI device ID (bsc#1174852).\n- net: ena: add support for reporting of packet drops (bsc#1174852).\n- net: ena: add support for the rx offset feature (bsc#1174852).\n- net: ena: add support for traffic mirroring (bsc#1174852).\n- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).\n- net: ena: allow setting the hash function without changing the key (bsc#1174852).\n- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).\n- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).\n- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).\n- net: ena: change num_queues to num_io_queues for clarity and consistency (bsc#1174852).\n- net: ena: changes to RSS hash key allocation (bsc#1174852).\n- net: ena: Change WARN_ON expression in ena_del_napi_in_range() (bsc#1174852).\n- net: ena: clean up indentation issue (bsc#1174852).\n- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).\n- net: ena: cosmetic: code reorderings (bsc#1174852).\n- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).\n- net: ena: cosmetic: fix line break issues (bsc#1174852).\n- net: ena: cosmetic: fix spacing issues (bsc#1174852).\n- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).\n- net: ena: cosmetic: minor code changes (bsc#1174852).\n- net: ena: cosmetic: remove unnecessary code (bsc#1174852).\n- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).\n- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).\n- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).\n- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).\n- net: ena: drop superfluous prototype (bsc#1174852).\n- net: ena: enable support of rss hash key and function changes (bsc#1174852).\n- net: ena: enable the interrupt_moderation in driver_supported_features (bsc#1174852).\n- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).\n- net: ena: ethtool: get_channels: use combined only (bsc#1174852).\n- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).\n- net: ena: ethtool: support set_channels callback (bsc#1174852).\n- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).\n- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).\n- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).\n- net: ena: fix incorrect setting of the number of msix vectors (bsc#1174852).\n- net: ena: fix incorrect update of intr_delay_resolution (bsc#1174852).\n- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).\n- net: ena: fix update of interrupt moderation register (bsc#1174852).\n- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).\n- net: ena: implement XDP drop support (bsc#1174852).\n- net: ena: Implement XDP_TX action (bsc#1174852).\n- net: ena: make ethtool -l show correct max number of queues (bsc#1174852).\n- net: ena: Make missed_tx stat incremental (bsc#1083548).\n- net: ena: Make some functions static (bsc#1174852).\n- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).\n- net: ena: multiple queue creation related cleanups (bsc#1174852).\n- net: ena: Prevent reset after device destruction (bsc#1083548).\n- net: ena: reduce driver load time (bsc#1174852).\n- net: ena: remove all old adaptive rx interrupt moderation code from ena_com (bsc#1174852).\n- net: ena: remove code duplication in ena_com_update_nonadaptive_moderation_interval _*() (bsc#1174852).\n- net: ena: remove code that does nothing (bsc#1174852).\n- net: ena: remove ena_restore_ethtool_params() and relevant fields (bsc#1174852).\n- net: ena: remove old adaptive interrupt moderation code from ena_netdev (bsc#1174852).\n- net: ena: remove redundant print of number of queues (bsc#1174852).\n- net: ena: remove set but not used variable \u0027hash_key\u0027 (bsc#1174852).\n- net: ena: remove set but not used variable \u0027rx_ring\u0027 (bsc#1174852).\n- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).\n- net: ena: Select DIMLIB for ENA_ETHERNET (bsc#1174852).\n- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).\n- net: ena: support new LLQ acceleration mode (bsc#1174852).\n- net: ena: switch to dim algorithm for rx adaptive interrupt moderation (bsc#1174852).\n- net: ena: use explicit variable size for clarity (bsc#1174852).\n- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).\n- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1174852).\n- net: ena: xdp: XDP_TX: fix memory leak (bsc#1174852).\n- net: ethernet: aquantia: Fix wrong return value (git-fixes).\n- net: ethernet: broadcom: have drivers select DIMLIB as needed (bsc#1174852).\n- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).\n- net: fec: correct the error path for regulator disable in probe (git-fixes).\n- netfilter: x_tables: add counters allocation wrapper (git-fixes).\n- netfilter: x_tables: cap allocations at 512 mbyte (git-fixes).\n- netfilter: x_tables: limit allocation requests for blob rule heads (git-fixes).\n- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)\n- net: fix memleak in register_netdevice() (networking-stable-20_06_28).\n- net: Fix the arp error in some cases (networking-stable-20_06_28).\n- net: gre: recompute gre csum for sctp over gre tunnels (git-fixes).\n- net: hns3: add autoneg and change speed support for fibre port (bsc#1174070).\n- net: hns3: add support for FEC encoding control (bsc#1174070).\n- net: hns3: add support for multiple media type (bsc#1174070).\n- net: hns3: fix a not link up issue when fibre port supports autoneg (bsc#1174070).\n- net: hns3: fix for FEC configuration (bsc#1174070).\n- net: hns3: fix port capbility updating issue (bsc#1174070).\n- net: hns3: fix port setting handle for fibre port (bsc#1174070).\n- net: hns3: fix selftest fail issue for fibre port with autoneg on (bsc#1174070).\n- net: hns3: restore the MAC autoneg state after reset (bsc#1174070).\n- net: increment xmit_recursion level in dev_direct_xmit() (networking-stable-20_06_28).\n- net: ip6_gre: Request headroom in __gre6_xmit() (git-fixes).\n- net: lan78xx: add missing endpoint sanity check (git-fixes).\n- net: lan78xx: fix transfer-buffer memory leak (git-fixes).\n- net: make symbol \u0027flush_works\u0027 static (git-fixes).\n- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).\n- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).\n- net: netsec: Fix signedness bug in netsec_probe() (bsc#1175417).\n- net: netsec: initialize tx ring on ndo_open (bsc#1175418).\n- net: phy: Check harder for errors in get_phy_id() (bsc#1111666).\n- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).\n- net: Set fput_needed iff FDPUT_FPUT is set (git-fixes).\n- net: socionext: Fix a signedness bug in ave_probe() (bsc#1175419).\n- net: socionext: replace napi_alloc_frag with the netdev variant on init (bsc#1175420).\n- net: spider_net: Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- net: stmmac: dwmac1000: provide multicast filter fallback (git-fixes).\n- net: stmmac: Fix RX packet size \u003e 8191 (git-fixes).\n- net: udp: Fix wrong clean up for IS_UDPLITE macro (git-fixes).\n- net: update net_dim documentation after rename (bsc#1174852).\n- net: usb: ax88179_178a: fix packet alignment padding (networking-stable-20_06_28).\n- net: usb: qmi_wwan: add support for Quectel EG95 LTE modem (networking-stable-20_07_17).\n- netvsc: unshare skb in VF rx handler (git-fixes).\n- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).\n- NTB: Fix an error in get link status (git-fixes).\n- ntb_netdev: fix sleep time mismatch (git-fixes).\n- NTB: ntb_transport: Use scnprintf() for avoiding potential buffer overflow (git-fixes).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme-multipath: do not fall back to __nvme_find_path() for non-optimized paths (bsc#1172108).\n- nvme-multipath: fix logic for non-optimized paths (bsc#1172108).\n- nvme-multipath: round-robin: eliminate \u0027fallback\u0027 variable (bsc#1172108).\n- nvme: multipath: round-robin: fix single non-optimized path case (bsc#1172108).\n- obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).\n- ocfs2: add trimfs dlm lock resource (bsc#1175228).\n- ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).\n- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n- ocfs2: change slot number type s16 to u16 (bsc#1175786).\n- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n- ocfs2: fix remounting needed after setfacl command (bsc#1173954).\n- ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).\n- ocfs2: fix value of OCFS2_INVALID_SLOT (bsc#1175767).\n- ocfs2: load global_inode_alloc (bsc#1172963).\n- ocfs2: load global_inode_alloc (bsc#1172963).\n- omapfb: dss: Fix max fclk divider for omap36xx (bsc#1113956)\n- openvswitch: Prevent kernel-infoleak in ovs_ct_put_key() (git-fixes).\n- PCI/ASPM: Add missing newline in sysfs \u0027policy\u0027 (git-fixes).\n- PCI: dwc: Move interrupt acking into the proper callback (bsc#1175666).\n- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).\n- PCI: Fix \u0027try\u0027 semantics of bus and slot reset (git-fixes).\n- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).\n- PCI: hv: Fix a timing issue which causes kdump to fail occasionally (bsc#1172871, bsc#1172872, git-fixes).\n- PCI: Release IVRS table in AMD ACS quirk (git-fixes).\n- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).\n- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).\n- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).\n- pinctrl: single: fix function name in documentation (git-fixes).\n- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).\n- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).\n- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).\n- PM / CPU: replace raw_notifier with atomic_notifier (git fixes (kernel/pm)).\n- PM / devfreq: rk3399_dmc: Add missing of_node_put() (bsc#1175668).\n- PM / devfreq: rk3399_dmc: Disable devfreq-event device when fails.\n- PM / devfreq: rk3399_dmc: Fix kernel oops when rockchip,pmu is absent (bsc#1175668).\n- PM: sleep: core: Fix the handling of pending runtime resume requests (git-fixes).\n- powerpc/64s: Do not init FSCR_DSCR in __init_FSCR() (bsc#1065729).\n- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).\n- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).\n- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).\n- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).\n- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).\n- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).\n- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).\n- powerpc/perf: Fix missing is_sier_aviable() during build (bsc#1065729).\n- powerpc/pseries: Do not initiate shutdown when system is running on UPS (bsc#1175440 ltc#187574).\n- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).\n- powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU death (bsc#1085030 ltC#165630).\n- powerpc/pseries: PCIE PHB reset (bsc#1174689).\n- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).\n- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).\n- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).\n- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).\n- propagate_one(): mnt_set_mountpoint() needs mount_lock (bsc#1174841).\n- pseries: Fix 64 bit logical memory block panic (bsc#1065729).\n- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).\n- rds: Prevent kernel-infoleak in rds_notify_queue_get() (git-fixes).\n- regulator: gpio: Honor regulator-boot-on property (git-fixes).\n- Revert \u0027ALSA: hda: call runtime_allow() for all hda controllers\u0027 (bsc#1111666).\n- Revert \u0027drm/amdgpu: Fix NULL dereference in dpm sysfs handlers\u0027 (bsc#1113956) \t* refresh for context changes\n- Revert \u0027ocfs2: avoid inode removal while nfsd is accessing it\u0027 This reverts commit 9e096c72476eda333a9998ff464580c00ff59c83.\n- Revert \u0027ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\u0027 This reverts commit 0bf6e248f93736b3f17f399b4a8f64ffa30d371e.\n- Revert \u0027ocfs2: load global_inode_alloc (bsc#1172963).\u0027 This reverts commit fc476497b53f967dc615b9cbad9427ba3107b5c4.\n- Revert \u0027scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe\u0027 (bsc#1171688 bsc#1174003).\n- Revert \u0027scsi: qla2xxx: Fix crash on qla2x00_mailbox_command\u0027 (bsc#1171688 bsc#1174003).\n- Revert \u0027sign also s390x kernel images (bsc#1163524)\u0027 This reverts commit b38b61155f0a2c3ebca06d4bb0c2e11a19a87f1f.\n- Revert \u0027xen/balloon: Fix crash when ballooning on x86 32 bit PAE\u0027 (bsc#1065600).\n- rocker: fix incorrect error handling in dma_rings_init (networking-stable-20_06_28).\n- rpm/check-for-config-changes: Ignore CONFIG_CC_VERSION_TEXT\n- rpm/check-for-config-changes: Ignore CONFIG_LD_VERSION\n- rpm/constraints.in: Increase memory for kernel-docs References: https://build.opensuse.org/request/show/792664\n- rpm: drop execute permissions on source files Sometimes a source file with execute permission appears in upstream repository and makes it into our kernel-source packages. This is caught by OBS build checks and may even result in build failures. Sanitize the source tree by removing execute permissions from all C source and header files.\n- rpm/kabi.pl: account for namespace field being moved last Upstream is moving the namespace field in Module.symvers last in order to preserve backwards compatibility with kmod tools (depmod, etc). Fix the kabi.pl script to expect the namespace field last. Since split() ignores trailing empty fields and delimeters, switch to using tr to count how many fields/tabs are in a line. Also, in load_symvers(), pass LIMIT of -1 to split() so it does not strip trailing empty fields, as namespace is an optional field.\n- rpm/kernel-binary.spec.in: do not run klp-symbols for configs with no modules Starting with 5.8-rc1, s390x/zfcpdump builds fail because rpm/klp-symbols script does not find .tmp_versions directory. This is missing because s390x/zfcpdump is built without modules (CONFIG_MODULES disabled). As livepatching cannot work without modules, the cleanest solution is setting %klp_symbols to 0 if CONFIG_MODULES is disabled. (We cannot simply add another condition to the place where %klp_symbols is set as it can be already set to 1 from prjconf.)\n- rpm/kernel-binary.spec.in: restrict livepatch metapackage to default flavor It has been reported that the kernel-*-livepatch metapackage got erroneously enabled for SLE15-SP3\u0027s new -preempt flavor, leading to a unresolvable dependency to a non-existing kernel-livepatch-x.y.z-preempt package. As SLE12 and SLE12-SP1 have run out of livepatching support, the need to build said metapackage for the -xen flavor is gone and the only remaining flavor for which they\u0027re still wanted is -default. Restrict the build of the kernel-*-livepatch metapackage to the -default flavor.\n- rpm/kernel-obs-build.spec.in: add dm-crypt for building with cryptsetup Co-Authored-By: Adam Spiers \u003caspiers@suse.com\u003e\n- rpm/kernel-obs-build.spec.in: Enable overlayfs Overlayfs is needed for podman or docker builds when no more specific driver can be used (like lvm or btrfs). As the default build fs is ext4 currently, we need overlayfs kernel modules to be available.\n- rpm/kernel-source.spec.in: Add obsolete_rebuilds (boo#1172073).\n- rpm/mkspec-dtb: add mt76 based dtb package\n- rpm/package-descriptions: garbege collection remove old ARM and Xen flavors.\n- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).\n- s390, dcssblk: kaddr and pfn can be NULL to -\u003edirect_access() (bsc#1174873).\n- sched: consistently handle layer3 header accesses in the presence of VLANs (networking-stable-20_07_17).\n- sched/deadline: Initialize -\u003edl_boosted (bsc#1112178). \n- scsi: dh: Add Fujitsu device to devinfo and dh lists (bsc#1174026).\n- scsi: Fix trivial spelling (bsc#1171688 bsc#1174003).\n- scsi: lpfc: Add and rename a whole bunch of function parameter descriptions (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Add description for lpfc_release_rpi()\u0027s \u0027ndlpl param (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Add missing misc_deregister() for lpfc_init() (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Ensure variable has the same stipulations as code using it (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix a bunch of kerneldoc misdemeanors (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix FCoE speed reporting (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix kerneldoc parameter formatting/misnaming/missing issues (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix LUN loss after cable pull (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix no message shown for lpfc_hdw_queue out of range value (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix oops when unloading driver while running mds diags (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix retry of PRLI when status indicates its unsupported (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix RSCN timeout due to incorrect gidft counter (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix some function parameter descriptions (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix typo in comment for ULP (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix-up around 120 documentation issues (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix-up formatting/docrot where appropriate (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Fix validation of bsg reply lengths (bsc#1171558 bsc#1136666).\n- scsi: lpfc: NVMe remote port devloss_tmo from lldd (bsc#1171558 bsc#1136666 bsc#1173060).\n- scsi: lpfc: nvmet: Avoid hang / use-after-free again when destroying targetport (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Provide description for lpfc_mem_alloc()\u0027s \u0027align\u0027 param (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Quieten some printks (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Remove unused variable \u0027pg_addr\u0027 (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Update lpfc version to 12.8.0.3 (bsc#1171558 bsc#1136666).\n- scsi: lpfc: Use __printf() format notation (bsc#1171558 bsc#1136666).\n- scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Address a set of sparse warnings (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1171688 bsc#1174003). \n- scsi: qla2xxx: Change {RD,WRT}_REG_*() function names from upper case into lower case (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix endianness annotations in header files (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix endianness annotations in source files (bsc#1171688 bsc#1174003). \n- scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix issue with adapter\u0027s stopping state (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix login timeout (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix null pointer access during disconnect from subsystem (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix spelling of a variable name (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix warning after FC target reset (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Flush all sessions on zone disable (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Flush I/O on zone disable (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Initialize \u0027n\u0027 before using it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Reduce noisy debug message (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove an unused function (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove a superfluous cast (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: SAN congestion management implementation (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use register names instead of register offsets (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use true, false for ha-\u003efw_dumped (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1171688 bsc#1174003).\n- scsi: smartpqi: add bay identifier (bsc#1172418).\n- scsi: smartpqi: add gigabyte controller (bsc#1172418).\n- scsi: smartpqi: add id support for SmartRAID 3152-8i (bsc#1172418).\n- scsi: smartpqi: add inquiry timeouts (bsc#1172418).\n- scsi: smartpqi: add module param for exposure order (bsc#1172418).\n- scsi: smartpqi: add module param to hide vsep (bsc#1172418).\n- scsi: smartpqi: add new pci ids (bsc#1172418).\n- scsi: smartpqi: add pci ids for fiberhome controller (bsc#1172418).\n- scsi: smartpqi: add RAID bypass counter (bsc#1172418).\n- scsi: smartpqi: add sysfs entries (bsc#1172418).\n- scsi: smartpqi: Align driver syntax with oob (bsc#1172418).\n- scsi: smartpqi: avoid crashing kernel for controller issues (bsc#1172418).\n- scsi: smartpqi: bump version (bsc#1172418).\n- scsi: smartpqi: bump version (bsc#1172418).\n- scsi: smartpqi: bump version to 1.2.16-010 (bsc#1172418).\n- scsi: smartpqi: change TMF timeout from 60 to 30 seconds (bsc#1172418).\n- scsi: smartpqi: correct hang when deleting 32 lds (bsc#1172418).\n- scsi: smartpqi: correct REGNEWD return status (bsc#1172418).\n- scsi: smartpqi: correct syntax issue (bsc#1172418).\n- scsi: smartpqi: fix call trace in device discovery (bsc#1172418).\n- scsi: smartpqi: fix controller lockup observed during force reboot (bsc#1172418).\n- scsi: smartpqi: fix LUN reset when fw bkgnd thread is hung (bsc#1172418).\n- scsi: smartpqi: fix problem with unique ID for physical device (bsc#1172418).\n- scsi: smartpqi: identify physical devices without issuing INQUIRY (bsc#1172418).\n- scsi: smartpqi: properly set both the DMA mask and the coherent DMA mask (bsc#1172418).\n- scsi: smartpqi: remove unused manifest constants (bsc#1172418).\n- scsi: smartpqi: Reporting unhandled SCSI errors (bsc#1172418).\n- scsi: smartpqi: support device deletion via sysfs (bsc#1172418).\n- scsi: smartpqi: update copyright (bsc#1172418).\n- scsi: smartpqi: update logical volume size after expansion (bsc#1172418).\n- scsi: smartpqi: Use scnprintf() for avoiding potential buffer overflow (bsc#1172418).\n- scsi: storvsc: Correctly set number of hardware queues for IDE disk (git-fixes).\n- scsi: target/iblock: fix WRITE SAME zeroing (bsc#1169790).\n- sctp: Do not advertise IPv4 addresses if ipv6only is set on the socket (networking-stable-20_06_28).\n- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).\n- serial: 8250: change lock order in serial8250_do_startup() (git-fixes).\n- serial: pl011: Do not leak amba_ports entry on driver register error (git-fixes).\n- serial: pl011: Fix oops on -EPROBE_DEFER (git-fixes).\n- Set VIRTIO_CONSOLE=y (bsc#1175667).\n- sign also s390x kernel images (bsc#1163524)\n- soc: fsl: qbman: allow registering a device link for the portal user (bsc#1174550).\n- soc: fsl: qbman_portals: add APIs to retrieve the probing status (bsc#1174550).\n- spi: davinci: Remove uninitialized_var() usage (git-fixes).\n- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).\n- spi: nxp-fspi: Ensure width is respected in spi-mem operations (bsc#1175421).\n- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1175422).\n- spi: spi-mem: export spi_mem_default_supports_op() (bsc#1175421).\n- tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT (networking-stable-20_06_28).\n- tcp: grow window for OOO packets only for SACK flows (networking-stable-20_06_28).\n- tcp: make sure listeners do not initialize congestion-control state (networking-stable-20_07_17).\n- tcp: md5: add missing memory barriers in tcp_md5_do_add()/tcp_md5_hash_key() (networking-stable-20_07_17).\n- tcp: md5: do not send silly options in SYNCOOKIES (networking-stable-20_07_17).\n- tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key() barriers (networking-stable-20_07_17).\n- tracepoint: Mark __tracepoint_string\u0027s __used (git-fixes).\n- tracing: Use trace_sched_process_free() instead of exit() for pid tracing (git-fixes).\n- tty: serial: fsl_lpuart: add imx8qxp support (bsc#1175670).\n- tty: serial: fsl_lpuart: free IDs allocated by IDA (bsc#1175670).\n- USB: cdc-acm: rework notification_buffer resizing (git-fixes).\n- USB: gadget: f_tcm: Fix some resource leaks in some error paths (git-fixes).\n- USB: host: ohci-exynos: Fix error handling in exynos_ohci_probe() (git-fixes).\n- USB: Ignore UAS for JMicron JMS567 ATA/ATAPI Bridge (git-fixes).\n- USB: iowarrior: fix up report size handling for some devices (git-fixes).\n- usbip: tools: fix module name in man page (git-fixes).\n- USB: rename USB quirk to USB_QUIRK_ENDPOINT_IGNORE (git-fixes).\n- USB: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).\n- USB: serial: cp210x: re-enable auto-RTS on open (git-fixes).\n- USB: serial: ftdi_sio: clean up receive processing (git-fixes).\n- USB: serial: ftdi_sio: fix break and sysrq handling (git-fixes).\n- USB: serial: ftdi_sio: make process-packet buffer unsigned (git-fixes).\n- USB: serial: iuu_phoenix: fix led-activity helpers (git-fixes).\n- USB: serial: qcserial: add EM7305 QDL product ID (git-fixes).\n- USB: xhci: define IDs for various ASMedia host controllers (git-fixes).\n- USB: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).\n- USB: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).\n- USB: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).\n- VFS: Check rename_lock in lookup_fast() (bsc#1174734).\n- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).\n- video: pxafb: Fix the function used to balance a \u0027dma_alloc_coherent()\u0027 call (git-fixes).\n- vlan: consolidate VLAN parsing code and limit max parsing depth (networking-stable-20_07_17).\n- vmxnet3: use correct tcp hdr length when packet is encapsulated (bsc#1175199).\n- vt_compat_ioctl(): clean up, use compat_ptr() properly (git-fixes).\n- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).\n- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (bsc#1111666).\n- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (bsc#1111666).\n- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (bsc#1111666).\n- wl1251: fix always return 0 error (git-fixes).\n- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1112178).\n- x86/hyperv: Create and use Hyper-V page definitions (git-fixes).\n- x86/hyper-v: Fix overflow bug in fill_gva_list() (git-fixes).\n- x86/hyperv: Make hv_vcpu_is_preempted() visible (git-fixes).\n- x86/mce/inject: Fix a wrong assignment of i_mce.status (bsc#1112178).\n- x86/unwind/orc: Fix ORC for newly forked tasks (bsc#1058115).\n- xen/balloon: fix accounting in alloc_xenballooned_pages error path (bsc#1065600).\n- xen/balloon: make the balloon wait interruptible (bsc#1065600).\n- xfrm: check id proto in validate_tmpl() (git-fixes).\n- xfrm: clean up xfrm protocol checks (git-fixes).\n- xfrm_user: uncoditionally validate esn replay attribute struct (git-fixes).\n- xfs: fix inode allocation block res calculation precedence (git-fixes).\n- xfs: fix reflink quota reservation accounting error (git-fixes).\n- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2574,SUSE-SLE-HA-12-SP5-2020-2574,SUSE-SLE-Live-Patching-12-SP5-2020-2574,SUSE-SLE-SDK-12-SP5-2020-2574,SUSE-SLE-SERVER-12-SP5-2020-2574,SUSE-SLE-WE-12-SP5-2020-2574", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2574-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2574-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202574-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2574-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1074701", "url": "https://bugzilla.suse.com/1074701" }, { "category": "self", "summary": "SUSE Bug 1083548", "url": "https://bugzilla.suse.com/1083548" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1085235", "url": "https://bugzilla.suse.com/1085235" }, { "category": "self", "summary": "SUSE Bug 1085308", "url": "https://bugzilla.suse.com/1085308" }, { "category": "self", "summary": "SUSE Bug 1087078", "url": "https://bugzilla.suse.com/1087078" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1094912", "url": "https://bugzilla.suse.com/1094912" }, { "category": "self", "summary": "SUSE Bug 1100394", "url": "https://bugzilla.suse.com/1100394" }, { "category": "self", "summary": "SUSE Bug 1102640", "url": "https://bugzilla.suse.com/1102640" }, { "category": "self", "summary": "SUSE Bug 1105412", "url": "https://bugzilla.suse.com/1105412" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1120163", "url": "https://bugzilla.suse.com/1120163" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1136666", "url": "https://bugzilla.suse.com/1136666" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1152148", "url": "https://bugzilla.suse.com/1152148" }, { "category": "self", "summary": "SUSE Bug 1163524", "url": "https://bugzilla.suse.com/1163524" }, { "category": "self", "summary": "SUSE Bug 1165629", "url": "https://bugzilla.suse.com/1165629" }, { "category": "self", "summary": "SUSE Bug 1166965", "url": "https://bugzilla.suse.com/1166965" }, { "category": "self", "summary": "SUSE Bug 1169790", "url": "https://bugzilla.suse.com/1169790" }, { "category": "self", "summary": "SUSE Bug 1170232", "url": "https://bugzilla.suse.com/1170232" }, { "category": "self", "summary": "SUSE Bug 1171558", "url": "https://bugzilla.suse.com/1171558" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1172073", "url": "https://bugzilla.suse.com/1172073" }, { "category": "self", "summary": "SUSE Bug 1172108", "url": "https://bugzilla.suse.com/1172108" }, { "category": "self", "summary": "SUSE Bug 1172247", "url": "https://bugzilla.suse.com/1172247" }, { "category": "self", "summary": "SUSE Bug 1172418", "url": "https://bugzilla.suse.com/1172418" }, { "category": "self", "summary": "SUSE Bug 1172428", "url": "https://bugzilla.suse.com/1172428" }, { "category": "self", "summary": "SUSE Bug 1172871", "url": "https://bugzilla.suse.com/1172871" }, { "category": "self", "summary": "SUSE Bug 1172872", "url": "https://bugzilla.suse.com/1172872" }, { "category": "self", "summary": "SUSE Bug 1172873", "url": "https://bugzilla.suse.com/1172873" }, { "category": "self", "summary": "SUSE Bug 1172963", "url": "https://bugzilla.suse.com/1172963" }, { "category": "self", "summary": "SUSE Bug 1173060", "url": "https://bugzilla.suse.com/1173060" }, { "category": "self", "summary": "SUSE Bug 1173485", "url": "https://bugzilla.suse.com/1173485" }, { "category": "self", "summary": "SUSE Bug 1173798", "url": "https://bugzilla.suse.com/1173798" }, { "category": "self", "summary": "SUSE Bug 1173954", "url": "https://bugzilla.suse.com/1173954" }, { "category": "self", "summary": "SUSE Bug 1174003", "url": "https://bugzilla.suse.com/1174003" }, { "category": "self", "summary": "SUSE Bug 1174026", "url": "https://bugzilla.suse.com/1174026" }, { "category": "self", "summary": "SUSE Bug 1174070", "url": "https://bugzilla.suse.com/1174070" }, { "category": "self", "summary": "SUSE Bug 1174161", "url": "https://bugzilla.suse.com/1174161" }, { "category": "self", "summary": "SUSE Bug 1174205", "url": "https://bugzilla.suse.com/1174205" }, { "category": "self", "summary": "SUSE Bug 1174387", "url": "https://bugzilla.suse.com/1174387" }, { "category": "self", "summary": "SUSE Bug 1174484", "url": "https://bugzilla.suse.com/1174484" }, { "category": "self", "summary": "SUSE Bug 1174547", "url": "https://bugzilla.suse.com/1174547" }, { "category": "self", "summary": "SUSE Bug 1174549", "url": "https://bugzilla.suse.com/1174549" }, { "category": "self", "summary": "SUSE Bug 1174550", "url": "https://bugzilla.suse.com/1174550" }, { "category": "self", "summary": "SUSE Bug 1174625", "url": "https://bugzilla.suse.com/1174625" }, { "category": "self", "summary": "SUSE Bug 1174658", "url": "https://bugzilla.suse.com/1174658" }, { "category": "self", "summary": "SUSE Bug 1174685", "url": "https://bugzilla.suse.com/1174685" }, { "category": "self", "summary": "SUSE Bug 1174689", "url": "https://bugzilla.suse.com/1174689" }, { "category": "self", "summary": "SUSE Bug 1174699", "url": "https://bugzilla.suse.com/1174699" }, { "category": "self", "summary": "SUSE Bug 1174734", "url": "https://bugzilla.suse.com/1174734" }, { "category": "self", "summary": "SUSE Bug 1174757", "url": "https://bugzilla.suse.com/1174757" }, { "category": "self", "summary": "SUSE Bug 1174771", "url": "https://bugzilla.suse.com/1174771" }, { "category": "self", "summary": "SUSE Bug 1174840", "url": "https://bugzilla.suse.com/1174840" }, { "category": "self", "summary": "SUSE Bug 1174841", "url": "https://bugzilla.suse.com/1174841" }, { "category": "self", "summary": "SUSE Bug 1174843", "url": "https://bugzilla.suse.com/1174843" }, { "category": "self", "summary": "SUSE Bug 1174844", "url": "https://bugzilla.suse.com/1174844" }, { "category": "self", "summary": "SUSE Bug 1174845", "url": "https://bugzilla.suse.com/1174845" }, { "category": "self", "summary": "SUSE Bug 1174852", "url": "https://bugzilla.suse.com/1174852" }, { "category": "self", "summary": "SUSE Bug 1174873", "url": "https://bugzilla.suse.com/1174873" }, { "category": "self", "summary": "SUSE Bug 1174904", "url": "https://bugzilla.suse.com/1174904" }, { "category": "self", "summary": "SUSE Bug 1174926", "url": "https://bugzilla.suse.com/1174926" }, { "category": "self", "summary": "SUSE Bug 1174968", "url": "https://bugzilla.suse.com/1174968" }, { "category": "self", "summary": "SUSE Bug 1175062", "url": "https://bugzilla.suse.com/1175062" }, { "category": "self", "summary": "SUSE Bug 1175063", "url": "https://bugzilla.suse.com/1175063" }, { "category": "self", "summary": "SUSE Bug 1175064", "url": "https://bugzilla.suse.com/1175064" }, { "category": "self", "summary": "SUSE Bug 1175065", "url": "https://bugzilla.suse.com/1175065" }, { "category": "self", "summary": "SUSE Bug 1175066", "url": "https://bugzilla.suse.com/1175066" }, { "category": "self", "summary": "SUSE Bug 1175067", "url": "https://bugzilla.suse.com/1175067" }, { "category": "self", "summary": "SUSE Bug 1175112", "url": "https://bugzilla.suse.com/1175112" }, { "category": "self", "summary": "SUSE Bug 1175127", "url": "https://bugzilla.suse.com/1175127" }, { "category": "self", "summary": "SUSE Bug 1175128", "url": "https://bugzilla.suse.com/1175128" }, { "category": "self", "summary": "SUSE Bug 1175149", "url": "https://bugzilla.suse.com/1175149" }, { "category": "self", "summary": "SUSE Bug 1175199", "url": "https://bugzilla.suse.com/1175199" }, { "category": "self", "summary": "SUSE Bug 1175213", "url": "https://bugzilla.suse.com/1175213" }, { "category": "self", "summary": "SUSE Bug 1175228", "url": "https://bugzilla.suse.com/1175228" }, { "category": "self", "summary": "SUSE Bug 1175232", "url": "https://bugzilla.suse.com/1175232" }, { "category": "self", "summary": "SUSE Bug 1175284", "url": "https://bugzilla.suse.com/1175284" }, { "category": "self", "summary": "SUSE Bug 1175393", "url": "https://bugzilla.suse.com/1175393" }, { "category": "self", "summary": "SUSE Bug 1175394", "url": "https://bugzilla.suse.com/1175394" }, { "category": "self", "summary": "SUSE Bug 1175396", "url": "https://bugzilla.suse.com/1175396" }, { "category": "self", "summary": "SUSE Bug 1175397", "url": "https://bugzilla.suse.com/1175397" }, { "category": "self", "summary": "SUSE Bug 1175398", "url": "https://bugzilla.suse.com/1175398" }, { "category": "self", "summary": "SUSE Bug 1175399", "url": "https://bugzilla.suse.com/1175399" }, { "category": "self", "summary": "SUSE Bug 1175400", "url": "https://bugzilla.suse.com/1175400" }, { "category": "self", "summary": "SUSE Bug 1175401", "url": "https://bugzilla.suse.com/1175401" }, { "category": "self", "summary": "SUSE Bug 1175402", "url": "https://bugzilla.suse.com/1175402" }, { "category": "self", "summary": "SUSE Bug 1175403", "url": "https://bugzilla.suse.com/1175403" }, { "category": "self", "summary": "SUSE Bug 1175404", "url": "https://bugzilla.suse.com/1175404" }, { "category": "self", "summary": "SUSE Bug 1175405", "url": "https://bugzilla.suse.com/1175405" }, { "category": "self", "summary": "SUSE Bug 1175406", "url": "https://bugzilla.suse.com/1175406" }, { "category": "self", "summary": "SUSE Bug 1175407", "url": "https://bugzilla.suse.com/1175407" }, { "category": "self", "summary": "SUSE Bug 1175408", "url": "https://bugzilla.suse.com/1175408" }, { "category": "self", "summary": "SUSE Bug 1175409", "url": "https://bugzilla.suse.com/1175409" }, { "category": "self", "summary": "SUSE Bug 1175410", "url": "https://bugzilla.suse.com/1175410" }, { "category": "self", "summary": "SUSE Bug 1175411", "url": "https://bugzilla.suse.com/1175411" }, { "category": "self", "summary": "SUSE Bug 1175412", "url": "https://bugzilla.suse.com/1175412" }, { "category": "self", "summary": "SUSE Bug 1175413", "url": "https://bugzilla.suse.com/1175413" }, { "category": "self", "summary": "SUSE Bug 1175414", "url": "https://bugzilla.suse.com/1175414" }, { "category": "self", "summary": "SUSE Bug 1175415", "url": "https://bugzilla.suse.com/1175415" }, { "category": "self", "summary": "SUSE Bug 1175416", "url": "https://bugzilla.suse.com/1175416" }, { "category": "self", "summary": "SUSE Bug 1175417", "url": "https://bugzilla.suse.com/1175417" }, { "category": "self", "summary": "SUSE Bug 1175418", "url": "https://bugzilla.suse.com/1175418" }, { "category": "self", "summary": "SUSE Bug 1175419", "url": "https://bugzilla.suse.com/1175419" }, { "category": "self", "summary": "SUSE Bug 1175420", "url": "https://bugzilla.suse.com/1175420" }, { "category": "self", "summary": "SUSE Bug 1175421", "url": "https://bugzilla.suse.com/1175421" }, { "category": "self", "summary": "SUSE Bug 1175422", "url": "https://bugzilla.suse.com/1175422" }, { "category": "self", "summary": "SUSE Bug 1175423", "url": "https://bugzilla.suse.com/1175423" }, { "category": "self", "summary": "SUSE Bug 1175440", "url": "https://bugzilla.suse.com/1175440" }, { "category": "self", "summary": "SUSE Bug 1175493", "url": "https://bugzilla.suse.com/1175493" }, { "category": "self", "summary": "SUSE Bug 1175515", "url": "https://bugzilla.suse.com/1175515" }, { "category": "self", "summary": "SUSE Bug 1175518", "url": "https://bugzilla.suse.com/1175518" }, { "category": "self", "summary": "SUSE Bug 1175526", "url": "https://bugzilla.suse.com/1175526" }, { "category": "self", "summary": "SUSE Bug 1175550", "url": "https://bugzilla.suse.com/1175550" }, { "category": "self", "summary": "SUSE Bug 1175654", "url": "https://bugzilla.suse.com/1175654" }, { "category": "self", "summary": "SUSE Bug 1175666", "url": "https://bugzilla.suse.com/1175666" }, { "category": "self", "summary": "SUSE Bug 1175667", "url": "https://bugzilla.suse.com/1175667" }, { "category": "self", "summary": "SUSE Bug 1175668", "url": "https://bugzilla.suse.com/1175668" }, { "category": "self", "summary": "SUSE Bug 1175669", "url": "https://bugzilla.suse.com/1175669" }, { "category": "self", "summary": "SUSE Bug 1175670", "url": "https://bugzilla.suse.com/1175670" }, { "category": "self", "summary": "SUSE Bug 1175691", "url": "https://bugzilla.suse.com/1175691" }, { "category": "self", "summary": "SUSE Bug 1175767", "url": "https://bugzilla.suse.com/1175767" }, { "category": "self", "summary": "SUSE Bug 1175768", "url": "https://bugzilla.suse.com/1175768" }, { "category": "self", "summary": "SUSE Bug 1175769", "url": "https://bugzilla.suse.com/1175769" }, { "category": "self", "summary": "SUSE Bug 1175770", "url": "https://bugzilla.suse.com/1175770" }, { "category": "self", "summary": "SUSE Bug 1175771", "url": "https://bugzilla.suse.com/1175771" }, { "category": "self", "summary": "SUSE Bug 1175772", "url": "https://bugzilla.suse.com/1175772" }, { "category": "self", "summary": "SUSE Bug 1175786", "url": "https://bugzilla.suse.com/1175786" }, { "category": "self", "summary": "SUSE Bug 1175873", "url": "https://bugzilla.suse.com/1175873" }, { "category": "self", "summary": "SUSE Bug 1176069", "url": "https://bugzilla.suse.com/1176069" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14314 page", "url": "https://www.suse.com/security/cve/CVE-2020-14314/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14356 page", "url": "https://www.suse.com/security/cve/CVE-2020-14356/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14386 page", "url": "https://www.suse.com/security/cve/CVE-2020-14386/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16166 page", "url": "https://www.suse.com/security/cve/CVE-2020-16166/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1749 page", "url": "https://www.suse.com/security/cve/CVE-2020-1749/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24394 page", "url": "https://www.suse.com/security/cve/CVE-2020-24394/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-09-08T15:53:42Z", "generator": { "date": "2020-09-08T15:53:42Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2574-1", "initial_release_date": "2020-09-08T15:53:42Z", "revision_history": [ { "date": "2020-09-08T15:53:42Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.37.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.37.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-122.37.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.37.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-122.37.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-122.37.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.37.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-122.37.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-122.37.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.37.1.aarch64", "product": { "name": "kernel-default-4.12.14-122.37.1.aarch64", "product_id": "kernel-default-4.12.14-122.37.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.37.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-122.37.1.aarch64", "product_id": "kernel-default-base-4.12.14-122.37.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.37.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-122.37.1.aarch64", "product_id": "kernel-default-devel-4.12.14-122.37.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.37.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-122.37.1.aarch64", "product_id": "kernel-default-extra-4.12.14-122.37.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.37.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-122.37.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-122.37.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.37.1.aarch64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.37.1.aarch64", "product_id": "kernel-default-kgraft-devel-4.12.14-122.37.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.37.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-122.37.1.aarch64", "product_id": "kernel-obs-build-4.12.14-122.37.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.37.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-122.37.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-122.37.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.37.1.aarch64", "product": { "name": "kernel-syms-4.12.14-122.37.1.aarch64", "product_id": "kernel-syms-4.12.14-122.37.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.37.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-122.37.1.aarch64", "product_id": "kernel-vanilla-4.12.14-122.37.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.37.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-122.37.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-122.37.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.37.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.37.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-122.37.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.37.1.aarch64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.37.1.aarch64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.37.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.37.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-122.37.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-122.37.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.37.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.37.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-122.37.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-122.37.1.noarch", "product": { "name": "kernel-devel-4.12.14-122.37.1.noarch", "product_id": "kernel-devel-4.12.14-122.37.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-122.37.1.noarch", "product": { "name": "kernel-docs-4.12.14-122.37.1.noarch", "product_id": "kernel-docs-4.12.14-122.37.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-122.37.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-122.37.1.noarch", "product_id": "kernel-docs-html-4.12.14-122.37.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-122.37.1.noarch", "product": { "name": "kernel-macros-4.12.14-122.37.1.noarch", "product_id": "kernel-macros-4.12.14-122.37.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-122.37.1.noarch", "product": { "name": "kernel-source-4.12.14-122.37.1.noarch", "product_id": "kernel-source-4.12.14-122.37.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-122.37.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-122.37.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-122.37.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.37.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-122.37.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-122.37.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.37.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-122.37.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-122.37.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.37.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-122.37.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-122.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-122.37.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-122.37.1.ppc64le", "product_id": "kernel-debug-4.12.14-122.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-122.37.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-122.37.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-122.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-122.37.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-122.37.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-122.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-122.37.1.ppc64le", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-122.37.1.ppc64le", "product_id": "kernel-debug-kgraft-devel-4.12.14-122.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.37.1.ppc64le", "product": { "name": "kernel-default-4.12.14-122.37.1.ppc64le", "product_id": "kernel-default-4.12.14-122.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.37.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-122.37.1.ppc64le", "product_id": "kernel-default-base-4.12.14-122.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.37.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-122.37.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-122.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.37.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-122.37.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-122.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.37.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-122.37.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-122.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.37.1.ppc64le", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.37.1.ppc64le", "product_id": "kernel-default-kgraft-devel-4.12.14-122.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.37.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-122.37.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-122.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.37.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-122.37.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-122.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.37.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-122.37.1.ppc64le", "product_id": "kernel-syms-4.12.14-122.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.37.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-122.37.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-122.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.37.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-122.37.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-122.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.37.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-122.37.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-122.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.37.1.ppc64le", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.37.1.ppc64le", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.37.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_37-default-1-8.5.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_37-default-1-8.5.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_37-default-1-8.5.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.37.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-122.37.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-122.37.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.37.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-122.37.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-122.37.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.37.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-122.37.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-122.37.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.37.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-122.37.1.s390x", "product_id": "dlm-kmp-default-4.12.14-122.37.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.37.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-122.37.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-122.37.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.37.1.s390x", "product": { "name": "kernel-default-4.12.14-122.37.1.s390x", "product_id": "kernel-default-4.12.14-122.37.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.37.1.s390x", "product": { "name": "kernel-default-base-4.12.14-122.37.1.s390x", "product_id": "kernel-default-base-4.12.14-122.37.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.37.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-122.37.1.s390x", "product_id": "kernel-default-devel-4.12.14-122.37.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.37.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-122.37.1.s390x", "product_id": "kernel-default-extra-4.12.14-122.37.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.37.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-122.37.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-122.37.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.37.1.s390x", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.37.1.s390x", "product_id": "kernel-default-kgraft-devel-4.12.14-122.37.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-122.37.1.s390x", "product": { "name": "kernel-default-man-4.12.14-122.37.1.s390x", "product_id": "kernel-default-man-4.12.14-122.37.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.37.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-122.37.1.s390x", "product_id": "kernel-obs-build-4.12.14-122.37.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.37.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-122.37.1.s390x", "product_id": "kernel-obs-qa-4.12.14-122.37.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.37.1.s390x", "product": { "name": "kernel-syms-4.12.14-122.37.1.s390x", "product_id": "kernel-syms-4.12.14-122.37.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.37.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-122.37.1.s390x", "product_id": "kernel-vanilla-4.12.14-122.37.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.37.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-122.37.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-122.37.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.37.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-122.37.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-122.37.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.37.1.s390x", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.37.1.s390x", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.37.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-122.37.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-122.37.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-122.37.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-122.37.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-122.37.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-122.37.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_37-default-1-8.5.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_37-default-1-8.5.1.s390x", "product_id": "kgraft-patch-4_12_14-122_37-default-1-8.5.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.37.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-122.37.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-122.37.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.37.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-122.37.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-122.37.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.37.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.37.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-122.37.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.37.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-122.37.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-122.37.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.37.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-122.37.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-122.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-122.37.1.x86_64", "product": { "name": "kernel-debug-4.12.14-122.37.1.x86_64", "product_id": "kernel-debug-4.12.14-122.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-122.37.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-122.37.1.x86_64", "product_id": "kernel-debug-base-4.12.14-122.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-122.37.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-122.37.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-122.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-122.37.1.x86_64", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-122.37.1.x86_64", "product_id": "kernel-debug-kgraft-devel-4.12.14-122.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.37.1.x86_64", "product": { "name": "kernel-default-4.12.14-122.37.1.x86_64", "product_id": "kernel-default-4.12.14-122.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.37.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-122.37.1.x86_64", "product_id": "kernel-default-base-4.12.14-122.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.37.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-122.37.1.x86_64", "product_id": "kernel-default-devel-4.12.14-122.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.37.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-122.37.1.x86_64", "product_id": "kernel-default-extra-4.12.14-122.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.37.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-122.37.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-122.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.37.1.x86_64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.37.1.x86_64", "product_id": "kernel-default-kgraft-devel-4.12.14-122.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-122.37.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-122.37.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-122.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-122.37.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-122.37.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-122.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-122.37.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-122.37.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-122.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.37.1.x86_64", "product": { "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.37.1.x86_64", "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.37.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-122.37.1.x86_64", "product_id": "kernel-obs-build-4.12.14-122.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.37.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-122.37.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-122.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.37.1.x86_64", "product": { "name": "kernel-syms-4.12.14-122.37.1.x86_64", "product_id": "kernel-syms-4.12.14-122.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.37.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-122.37.1.x86_64", "product_id": "kernel-vanilla-4.12.14-122.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.37.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-122.37.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-122.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.37.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.37.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-122.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.37.1.x86_64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.37.1.x86_64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.37.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_37-default-1-8.5.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_37-default-1-8.5.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_37-default-1-8.5.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.37.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-122.37.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-122.37.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.37.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.37.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-122.37.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.37.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.37.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.37.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.37.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-122.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.37.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-122.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.37.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-122.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.37.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-122.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.37.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-122.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.37.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-122.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.37.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.37.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.37.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.37.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.12.14-122.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.37.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.s390x" }, "product_reference": "kernel-default-kgraft-4.12.14-122.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.37.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.12.14-122.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.37.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.ppc64le" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.37.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.s390x" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.37.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.x86_64" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-1-8.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-1-8.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-1-8.5.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-1-8.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-1-8.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-1-8.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-122.37.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.37.1.noarch" }, "product_reference": "kernel-docs-4.12.14-122.37.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.37.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-122.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.37.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-122.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.37.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-122.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.37.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-122.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.37.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.aarch64" }, "product_reference": "kernel-default-4.12.14-122.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.37.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-122.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.37.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.s390x" }, "product_reference": "kernel-default-4.12.14-122.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.37.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.37.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-122.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.37.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-122.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.37.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-122.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.37.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.37.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-122.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.37.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-122.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.37.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-122.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.37.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-122.37.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-122.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.37.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.37.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.37.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.37.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.37.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.37.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.37.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.37.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.37.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.37.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-122.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.37.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-122.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.37.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.s390x" }, "product_reference": "kernel-syms-4.12.14-122.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.37.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.37.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.aarch64" }, "product_reference": "kernel-default-4.12.14-122.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-122.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.37.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.s390x" }, "product_reference": "kernel-default-4.12.14-122.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.37.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-122.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-122.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.37.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-122.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.37.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-122.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-122.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.37.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-122.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-122.37.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-122.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.37.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.37.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.37.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.37.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.37.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.37.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.37.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.37.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.37.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.37.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-122.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-122.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.37.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.s390x" }, "product_reference": "kernel-syms-4.12.14-122.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-122.37.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.37.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-122.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14314", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14314" } ], "notes": [ { "category": "general", "text": "A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14314", "url": "https://www.suse.com/security/cve/CVE-2020-14314" }, { "category": "external", "summary": "SUSE Bug 1173798 for CVE-2020-14314", "url": "https://bugzilla.suse.com/1173798" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-08T15:53:42Z", "details": "moderate" } ], "title": "CVE-2020-14314" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-08T15:53:42Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14356" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14356", "url": "https://www.suse.com/security/cve/CVE-2020-14356" }, { "category": "external", "summary": "SUSE Bug 1175213 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1175213" }, { "category": "external", "summary": "SUSE Bug 1176392 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1176392" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-08T15:53:42Z", "details": "moderate" } ], "title": "CVE-2020-14356" }, { "cve": "CVE-2020-14386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14386" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14386", "url": "https://www.suse.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "SUSE Bug 1176069 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176069" }, { "category": "external", "summary": "SUSE Bug 1176072 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-08T15:53:42Z", "details": "important" } ], "title": "CVE-2020-14386" }, { "cve": "CVE-2020-16166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16166" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16166", "url": "https://www.suse.com/security/cve/CVE-2020-16166" }, { "category": "external", "summary": "SUSE Bug 1174757 for CVE-2020-16166", "url": "https://bugzilla.suse.com/1174757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-08T15:53:42Z", "details": "moderate" } ], "title": "CVE-2020-16166" }, { "cve": "CVE-2020-1749", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1749" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1749", "url": "https://www.suse.com/security/cve/CVE-2020-1749" }, { "category": "external", "summary": "SUSE Bug 1165629 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165629" }, { "category": "external", "summary": "SUSE Bug 1165631 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165631" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177513" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1189302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-08T15:53:42Z", "details": "important" } ], "title": "CVE-2020-1749" }, { "cve": "CVE-2020-24394", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24394" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24394", "url": "https://www.suse.com/security/cve/CVE-2020-24394" }, { "category": "external", "summary": "SUSE Bug 1175518 for CVE-2020-24394", "url": "https://bugzilla.suse.com/1175518" }, { "category": "external", "summary": "SUSE Bug 1175992 for CVE-2020-24394", "url": "https://bugzilla.suse.com/1175992" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-08T15:53:42Z", "details": "important" } ], "title": "CVE-2020-24394" } ] }
suse-su-2020:2623-1
Vulnerability from csaf_suse
Published
2020-09-14 11:53
Modified
2020-09-14 11:53
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup (bsc#1165629).
- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).
- CVE-2020-14356: Fixed a null pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213).
- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).
- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).
- CVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).
- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication Bluetooth might have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access (bsc#1171988).
- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).
The following non-security bugs were fixed:
- btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784).
- cifs: document and cleanup dfs mount (bsc#1144333 bsc#1172428).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1144333 bsc#1172428).
- cifs: fix double free error on share and prefix (bsc#1144333 bsc#1172428).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1144333 bsc#1172428).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1144333 bsc#1172428).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1144333 bsc#1172428).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1144333 bsc#1172428).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1144333 bsc#1172428).
- cifs: rename reconn_inval_dfs_target() (bsc#1144333 bsc#1172428).
- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127).
- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).
- ip6_tunnel: allow not to count pkts on tstats by passing dev as NULL (bsc#1175515).
- ip_tunnel: allow not to count pkts on tstats by setting skb's dev to NULL (bsc#1175515).
- ipvs: fix the connection sync failed in some cases (bsc#1174699).
- kabi: hide new parameter of ip6_dst_lookup_flow() (bsc#1165629).
- kabi: mask changes to struct ipv6_stub (bsc#1165629).
- mm: Avoid calling build_all_zonelists_init under hotplug context (bsc#1154366).
- mm, vmstat: reduce zone->lock holding time by /proc/pagetypeinfo (bsc#1175691).
- ocfs2: add trimfs dlm lock resource (bsc#1175228).
- ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: fix remounting needed after setfacl command (bsc#1173954).
- ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).
- ocfs2: load global_inode_alloc (bsc#1172963).
- ocfs2: load global_inode_alloc (bsc#1172963).
- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).
- powerpc/pseries: PCIE PHB reset (bsc#1174689).
- Revert 'ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).' This reverts commit 2638f62c6bc33d4c10ce0dddbf240aa80d366d7b.
- Revert 'ocfs2: load global_inode_alloc (bsc#1172963).' This reverts commit f04f670651f505cb354f26601ec5f5e4428f2f47.
- scsi: scsi_dh_alua: skip RTPG for devices only supporting active/optimized (bsc#1174978).
- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).
- Update patch reference for a tipc fix patch (bsc#1175515)
- x86/unwind/orc: Fix ORC for newly forked tasks (bsc#1058115).
- xen: do not reschedule in preemption off sections (bsc#1175749).
Patchnames
SUSE-2020-2623,SUSE-OpenStack-Cloud-9-2020-2623,SUSE-OpenStack-Cloud-Crowbar-9-2020-2623,SUSE-SLE-HA-12-SP4-2020-2623,SUSE-SLE-Live-Patching-12-SP4-2020-2623,SUSE-SLE-SAP-12-SP4-2020-2623,SUSE-SLE-SERVER-12-SP4-LTSS-2020-2623
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup (bsc#1165629).\n- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).\n- CVE-2020-14356: Fixed a null pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213).\n- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).\n- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).\n- CVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).\n- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication Bluetooth might have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access (bsc#1171988).\n- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).\n\nThe following non-security bugs were fixed:\n\n- btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784).\n- cifs: document and cleanup dfs mount (bsc#1144333 bsc#1172428).\n- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1144333 bsc#1172428).\n- cifs: fix double free error on share and prefix (bsc#1144333 bsc#1172428).\n- cifs: handle empty list of targets in cifs_reconnect() (bsc#1144333 bsc#1172428).\n- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1144333 bsc#1172428).\n- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1144333 bsc#1172428).\n- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1144333 bsc#1172428).\n- cifs: reduce number of referral requests in DFS link lookups (bsc#1144333 bsc#1172428).\n- cifs: rename reconn_inval_dfs_target() (bsc#1144333 bsc#1172428).\n- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127).\n- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).\n- ip6_tunnel: allow not to count pkts on tstats by passing dev as NULL (bsc#1175515).\n- ip_tunnel: allow not to count pkts on tstats by setting skb\u0027s dev to NULL (bsc#1175515).\n- ipvs: fix the connection sync failed in some cases (bsc#1174699).\n- kabi: hide new parameter of ip6_dst_lookup_flow() (bsc#1165629).\n- kabi: mask changes to struct ipv6_stub (bsc#1165629).\n- mm: Avoid calling build_all_zonelists_init under hotplug context (bsc#1154366).\n- mm, vmstat: reduce zone-\u003elock holding time by /proc/pagetypeinfo (bsc#1175691).\n- ocfs2: add trimfs dlm lock resource (bsc#1175228).\n- ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).\n- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n- ocfs2: fix remounting needed after setfacl command (bsc#1173954).\n- ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).\n- ocfs2: load global_inode_alloc (bsc#1172963).\n- ocfs2: load global_inode_alloc (bsc#1172963).\n- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).\n- powerpc/pseries: PCIE PHB reset (bsc#1174689).\n- Revert \u0027ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\u0027 This reverts commit 2638f62c6bc33d4c10ce0dddbf240aa80d366d7b.\n- Revert \u0027ocfs2: load global_inode_alloc (bsc#1172963).\u0027 This reverts commit f04f670651f505cb354f26601ec5f5e4428f2f47.\n- scsi: scsi_dh_alua: skip RTPG for devices only supporting active/optimized (bsc#1174978). \n- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).\n- Update patch reference for a tipc fix patch (bsc#1175515)\n- x86/unwind/orc: Fix ORC for newly forked tasks (bsc#1058115).\n- xen: do not reschedule in preemption off sections (bsc#1175749).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2623,SUSE-OpenStack-Cloud-9-2020-2623,SUSE-OpenStack-Cloud-Crowbar-9-2020-2623,SUSE-SLE-HA-12-SP4-2020-2623,SUSE-SLE-Live-Patching-12-SP4-2020-2623,SUSE-SLE-SAP-12-SP4-2020-2623,SUSE-SLE-SERVER-12-SP4-LTSS-2020-2623", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2623-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2623-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202623-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2623-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1154366", "url": "https://bugzilla.suse.com/1154366" }, { "category": "self", "summary": "SUSE Bug 1165629", "url": "https://bugzilla.suse.com/1165629" }, { "category": "self", "summary": "SUSE Bug 1171988", "url": "https://bugzilla.suse.com/1171988" }, { "category": "self", "summary": "SUSE Bug 1172428", "url": "https://bugzilla.suse.com/1172428" }, { "category": "self", "summary": "SUSE Bug 1172963", "url": "https://bugzilla.suse.com/1172963" }, { "category": "self", "summary": "SUSE Bug 1173798", "url": "https://bugzilla.suse.com/1173798" }, { "category": "self", "summary": "SUSE Bug 1173954", "url": "https://bugzilla.suse.com/1173954" }, { "category": "self", "summary": "SUSE Bug 1174205", "url": "https://bugzilla.suse.com/1174205" }, { "category": "self", "summary": "SUSE Bug 1174689", "url": "https://bugzilla.suse.com/1174689" }, { "category": "self", "summary": "SUSE Bug 1174699", "url": "https://bugzilla.suse.com/1174699" }, { "category": "self", "summary": "SUSE Bug 1174757", "url": "https://bugzilla.suse.com/1174757" }, { "category": "self", "summary": "SUSE Bug 1174784", "url": "https://bugzilla.suse.com/1174784" }, { "category": "self", "summary": "SUSE Bug 1174978", "url": "https://bugzilla.suse.com/1174978" }, { "category": "self", "summary": "SUSE Bug 1175112", "url": "https://bugzilla.suse.com/1175112" }, { "category": "self", "summary": "SUSE Bug 1175127", "url": "https://bugzilla.suse.com/1175127" }, { "category": "self", "summary": "SUSE Bug 1175213", "url": "https://bugzilla.suse.com/1175213" }, { "category": "self", "summary": "SUSE Bug 1175228", "url": "https://bugzilla.suse.com/1175228" }, { "category": "self", "summary": "SUSE Bug 1175515", "url": "https://bugzilla.suse.com/1175515" }, { "category": "self", "summary": "SUSE Bug 1175518", "url": "https://bugzilla.suse.com/1175518" }, { "category": "self", "summary": "SUSE Bug 1175691", "url": "https://bugzilla.suse.com/1175691" }, { "category": "self", "summary": "SUSE Bug 1175749", "url": "https://bugzilla.suse.com/1175749" }, { "category": "self", "summary": "SUSE Bug 1176069", "url": "https://bugzilla.suse.com/1176069" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14314 page", "url": "https://www.suse.com/security/cve/CVE-2020-14314/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14356 page", "url": "https://www.suse.com/security/cve/CVE-2020-14356/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14386 page", "url": "https://www.suse.com/security/cve/CVE-2020-14386/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16166 page", "url": "https://www.suse.com/security/cve/CVE-2020-16166/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1749 page", "url": "https://www.suse.com/security/cve/CVE-2020-1749/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24394 page", "url": "https://www.suse.com/security/cve/CVE-2020-24394/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-09-14T11:53:34Z", "generator": { "date": "2020-09-14T11:53:34Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2623-1", "initial_release_date": "2020-09-14T11:53:34Z", "revision_history": [ { "date": "2020-09-14T11:53:34Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.60.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.60.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-95.60.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.60.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-95.60.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-95.60.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.60.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-95.60.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-95.60.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.60.1.aarch64", "product": { "name": "kernel-default-4.12.14-95.60.1.aarch64", "product_id": "kernel-default-4.12.14-95.60.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.60.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-95.60.1.aarch64", "product_id": "kernel-default-base-4.12.14-95.60.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.60.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-95.60.1.aarch64", "product_id": "kernel-default-devel-4.12.14-95.60.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.60.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-95.60.1.aarch64", "product_id": "kernel-default-extra-4.12.14-95.60.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.60.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-95.60.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-95.60.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.60.1.aarch64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.60.1.aarch64", "product_id": "kernel-default-kgraft-devel-4.12.14-95.60.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.60.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-95.60.1.aarch64", "product_id": "kernel-obs-build-4.12.14-95.60.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.60.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-95.60.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-95.60.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.60.1.aarch64", "product": { "name": "kernel-syms-4.12.14-95.60.1.aarch64", "product_id": "kernel-syms-4.12.14-95.60.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.60.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-95.60.1.aarch64", "product_id": "kernel-vanilla-4.12.14-95.60.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.60.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-95.60.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-95.60.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.60.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.60.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-95.60.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.60.1.aarch64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.60.1.aarch64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.60.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.60.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-95.60.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-95.60.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.60.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.60.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-95.60.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-95.60.1.noarch", "product": { "name": "kernel-devel-4.12.14-95.60.1.noarch", "product_id": "kernel-devel-4.12.14-95.60.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-95.60.1.noarch", "product": { "name": "kernel-docs-4.12.14-95.60.1.noarch", "product_id": "kernel-docs-4.12.14-95.60.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-95.60.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-95.60.1.noarch", "product_id": "kernel-docs-html-4.12.14-95.60.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-95.60.1.noarch", "product": { "name": "kernel-macros-4.12.14-95.60.1.noarch", "product_id": "kernel-macros-4.12.14-95.60.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-95.60.1.noarch", "product": { "name": "kernel-source-4.12.14-95.60.1.noarch", "product_id": "kernel-source-4.12.14-95.60.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-95.60.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-95.60.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-95.60.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.60.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-95.60.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-95.60.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.60.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-95.60.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-95.60.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.60.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-95.60.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-95.60.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.60.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-95.60.1.ppc64le", "product_id": "kernel-debug-4.12.14-95.60.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.60.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-95.60.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-95.60.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.60.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-95.60.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-95.60.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-95.60.1.ppc64le", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-95.60.1.ppc64le", "product_id": "kernel-debug-kgraft-devel-4.12.14-95.60.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.60.1.ppc64le", "product": { "name": "kernel-default-4.12.14-95.60.1.ppc64le", "product_id": "kernel-default-4.12.14-95.60.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.60.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-95.60.1.ppc64le", "product_id": "kernel-default-base-4.12.14-95.60.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.60.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-95.60.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-95.60.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.60.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-95.60.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-95.60.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.60.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-95.60.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-95.60.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le", "product_id": "kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.60.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-95.60.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-95.60.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.60.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-95.60.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-95.60.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.60.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-95.60.1.ppc64le", "product_id": "kernel-syms-4.12.14-95.60.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.60.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-95.60.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-95.60.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.60.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-95.60.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-95.60.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.60.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-95.60.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-95.60.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.60.1.ppc64le", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.60.1.ppc64le", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.60.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le", "product_id": "kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.60.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-95.60.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-95.60.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.60.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-95.60.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-95.60.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.60.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-95.60.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-95.60.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.60.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-95.60.1.s390x", "product_id": "dlm-kmp-default-4.12.14-95.60.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.60.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-95.60.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-95.60.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.60.1.s390x", "product": { "name": "kernel-default-4.12.14-95.60.1.s390x", "product_id": "kernel-default-4.12.14-95.60.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.60.1.s390x", "product": { "name": "kernel-default-base-4.12.14-95.60.1.s390x", "product_id": "kernel-default-base-4.12.14-95.60.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.60.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-95.60.1.s390x", "product_id": "kernel-default-devel-4.12.14-95.60.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.60.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-95.60.1.s390x", "product_id": "kernel-default-extra-4.12.14-95.60.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.60.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-95.60.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-95.60.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.60.1.s390x", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.60.1.s390x", "product_id": "kernel-default-kgraft-devel-4.12.14-95.60.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-95.60.1.s390x", "product": { "name": "kernel-default-man-4.12.14-95.60.1.s390x", "product_id": "kernel-default-man-4.12.14-95.60.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.60.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-95.60.1.s390x", "product_id": "kernel-obs-build-4.12.14-95.60.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.60.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-95.60.1.s390x", "product_id": "kernel-obs-qa-4.12.14-95.60.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.60.1.s390x", "product": { "name": "kernel-syms-4.12.14-95.60.1.s390x", "product_id": "kernel-syms-4.12.14-95.60.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.60.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-95.60.1.s390x", "product_id": "kernel-vanilla-4.12.14-95.60.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.60.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-95.60.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-95.60.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.60.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-95.60.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-95.60.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.60.1.s390x", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.60.1.s390x", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.60.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-95.60.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-95.60.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-95.60.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-95.60.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-95.60.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-95.60.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x", "product": { "name": "kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x", "product_id": "kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.60.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-95.60.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-95.60.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.60.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-95.60.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-95.60.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.60.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.60.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-95.60.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.60.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-95.60.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-95.60.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.60.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-95.60.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-95.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.60.1.x86_64", "product": { "name": "kernel-debug-4.12.14-95.60.1.x86_64", "product_id": "kernel-debug-4.12.14-95.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.60.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-95.60.1.x86_64", "product_id": "kernel-debug-base-4.12.14-95.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.60.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-95.60.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-95.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-95.60.1.x86_64", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-95.60.1.x86_64", "product_id": "kernel-debug-kgraft-devel-4.12.14-95.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.60.1.x86_64", "product": { "name": "kernel-default-4.12.14-95.60.1.x86_64", "product_id": "kernel-default-4.12.14-95.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.60.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-95.60.1.x86_64", "product_id": "kernel-default-base-4.12.14-95.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.60.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-95.60.1.x86_64", "product_id": "kernel-default-devel-4.12.14-95.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.60.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-95.60.1.x86_64", "product_id": "kernel-default-extra-4.12.14-95.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.60.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-95.60.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-95.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64", "product_id": "kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-95.60.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-95.60.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-95.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-95.60.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-95.60.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-95.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-95.60.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-95.60.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-95.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.60.1.x86_64", "product": { "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.60.1.x86_64", "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-95.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.60.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-95.60.1.x86_64", "product_id": "kernel-obs-build-4.12.14-95.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.60.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-95.60.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-95.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.60.1.x86_64", "product": { "name": "kernel-syms-4.12.14-95.60.1.x86_64", "product_id": "kernel-syms-4.12.14-95.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.60.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-95.60.1.x86_64", "product_id": "kernel-vanilla-4.12.14-95.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.60.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-95.60.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-95.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.60.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.60.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-95.60.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.60.1.x86_64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.60.1.x86_64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.60.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64", "product_id": "kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.60.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-95.60.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-95.60.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.60.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.60.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-95.60.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 9", "product": { "name": "SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:9" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 9", "product": { "name": "SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.60.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.60.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.60.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.60.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.60.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.60.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.60.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.60.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.60.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.60.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.60.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.60.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.60.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.60.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.60.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.60.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.60.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.60.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.60.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.60.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.60.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.60.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.60.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.60.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.60.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.60.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.60.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.60.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.60.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.60.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.60.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.60.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.60.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.60.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.60.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.60.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.60.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.60.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.60.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.60.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.60.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.60.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.60.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.60.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.60.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.60.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.60.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.60.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-95.60.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.60.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-95.60.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.60.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-95.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.60.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-95.60.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.60.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-95.60.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.60.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-95.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.60.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.60.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.60.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.60.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.60.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.60.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.12.14-95.60.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.60.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.s390x" }, "product_reference": "kernel-default-kgraft-4.12.14-95.60.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.60.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.12.14-95.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.60.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.s390x" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.60.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.60.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.60.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.60.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.60.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.60.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.60.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.60.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.60.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.60.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.60.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.60.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.60.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.60.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.60.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.60.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.60.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.60.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.60.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.60.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.60.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.60.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.60.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.aarch64" }, "product_reference": "kernel-default-4.12.14-95.60.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.60.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.60.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.60.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.s390x" }, "product_reference": "kernel-default-4.12.14-95.60.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.60.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.60.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-95.60.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.60.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.60.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.60.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-95.60.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.60.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.60.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-95.60.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.60.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.60.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.60.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-95.60.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.60.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-95.60.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.60.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-95.60.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.60.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.60.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.60.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.60.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.60.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.60.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.60.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.60.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.60.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.60.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-95.60.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.60.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.60.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.60.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.s390x" }, "product_reference": "kernel-syms-4.12.14-95.60.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.60.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.60.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.60.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.60.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.60.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-14T11:53:34Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-14314", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14314" } ], "notes": [ { "category": "general", "text": "A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.60.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14314", "url": "https://www.suse.com/security/cve/CVE-2020-14314" }, { "category": "external", "summary": "SUSE Bug 1173798 for CVE-2020-14314", "url": "https://bugzilla.suse.com/1173798" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.60.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.60.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-14T11:53:34Z", "details": "moderate" } ], "title": "CVE-2020-14314" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.60.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.60.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.60.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-14T11:53:34Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14356" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.60.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14356", "url": "https://www.suse.com/security/cve/CVE-2020-14356" }, { "category": "external", "summary": "SUSE Bug 1175213 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1175213" }, { "category": "external", "summary": "SUSE Bug 1176392 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1176392" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.60.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.60.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-14T11:53:34Z", "details": "moderate" } ], "title": "CVE-2020-14356" }, { "cve": "CVE-2020-14386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14386" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.60.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14386", "url": "https://www.suse.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "SUSE Bug 1176069 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176069" }, { "category": "external", "summary": "SUSE Bug 1176072 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.60.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.60.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-14T11:53:34Z", "details": "important" } ], "title": "CVE-2020-14386" }, { "cve": "CVE-2020-16166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16166" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.60.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16166", "url": "https://www.suse.com/security/cve/CVE-2020-16166" }, { "category": "external", "summary": "SUSE Bug 1174757 for CVE-2020-16166", "url": "https://bugzilla.suse.com/1174757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.60.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.60.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-14T11:53:34Z", "details": "moderate" } ], "title": "CVE-2020-16166" }, { "cve": "CVE-2020-1749", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1749" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.60.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1749", "url": "https://www.suse.com/security/cve/CVE-2020-1749" }, { "category": "external", "summary": "SUSE Bug 1165629 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165629" }, { "category": "external", "summary": "SUSE Bug 1165631 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165631" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177513" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1189302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.60.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.60.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-14T11:53:34Z", "details": "important" } ], "title": "CVE-2020-1749" }, { "cve": "CVE-2020-24394", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24394" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.60.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24394", "url": "https://www.suse.com/security/cve/CVE-2020-24394" }, { "category": "external", "summary": "SUSE Bug 1175518 for CVE-2020-24394", "url": "https://bugzilla.suse.com/1175518" }, { "category": "external", "summary": "SUSE Bug 1175992 for CVE-2020-24394", "url": "https://bugzilla.suse.com/1175992" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.60.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.60.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.60.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.60.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.60.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-14T11:53:34Z", "details": "important" } ], "title": "CVE-2020-24394" } ] }
suse-su-2020:2486-1
Vulnerability from csaf_suse
Published
2020-09-03 18:16
Modified
2020-09-03 18:16
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-14314: Fixed a potential negative array index in ext4 (bsc#1173798).
- CVE-2020-14331: Fixed a missing check in scrollback handling (bsc#1174205 bsc#1174247).
- CVE-2020-14356: Fixed a NULL pointer dereference in the cgroupv2 subsystem (bsc#1175213).
- CVE-2020-16166: Fixed an information leak in the network RNG (bsc#1174757).
The following non-security bugs were fixed:
- 9p/trans_fd: Fix concurrency del of req_list in p9_fd_cancelled/p9_read_work (git-fixes).
- ACPICA: Do not increment operation_region reference counts for field units (git-fixes).
- af_key: pfkey_dump needs parameter validation (git-fixes).
- agp/intel: Fix a memory leak on module initialisation failure (git-fixes).
- ALSA: atmel: Remove invalid 'fall through' comments (git-fixes).
- ALSA: core: pcm_iec958: fix kernel-doc (git-fixes).
- ALSA: echoaduio: Drop superfluous volatile modifier (git-fixes).
- ALSA: echoaudio: Address bugs in the interrupt handling (git-fixes).
- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (git-fixes).
- ALSA: echoaudio: Prevent races in calls to set_audio_format() (git-fixes).
- ALSA: echoaudio: Prevent some noise on unloading the module (git-fixes).
- ALSA: echoaudio: Race conditions around 'opencount' (git-fixes).
- ALSA: echoaudio: re-enable IRQs on failure path (git-fixes).
- ALSA: echoaudio: Remove redundant check (git-fixes).
- ALSA: firewire: fix kernel-doc (git-fixes).
- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (git-fixes).
- ALSA: hda - reverse the setting value in the micmute_led_set (git-fixes).
- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (git-fixes).
- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (git-fixes).
- ALSA: hda/hdmi: Add quirk to force connectivity (git-fixes).
- ALSA: hda/hdmi: Fix keep_power assignment for non-component devices (git-fixes).
- ALSA: hda/hdmi: Use force connectivity quirk on another HP desktop (git-fixes).
- ALSA: hda/realtek - Fix unused variable warning (git-fixes).
- ALSA: hda/realtek - Fixed HP right speaker no sound (git-fixes).
- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (git-fixes).
- ALSA: hda/realtek: Add model alc298-samsung-headphone (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex Book (git-fixes).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (git-fixes).
- ALSA: hda/realtek: Fix add a 'ultra_low_power' function for intel reference board (alc256) (git-fixes).
- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (git-fixes).
- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (git-fixes).
- ALSA: hda/tegra: Disable sync-write operation (git-fixes).
- ALSA: hda: Add support for Loongson 7A1000 controller (git-fixes).
- ALSA: hda: avoid reset of sdo_limit (git-fixes).
- ALSA: hda: Enable sync-write operation as default for all controllers (git-fixes).
- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).
- ALSA: hda: fix snd_hda_codec_cleanup() documentation (git-fixes).
- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).
- ALSA: isa/gus: remove 'set but not used' warning (git-fixes).
- ALSA: isa/gus: remove -Wmissing-prototypes warnings (git-fixes).
- ALSA: isa: fix spelling mistakes in the comments (git-fixes).
- ALSA: line6: add hw monitor volume control for POD HD500 (git-fixes).
- ALSA: line6: Use kmemdup in podhd_set_monitor_level() (git-fixes).
- ALSA: pci/asihpi: fix kernel-doc (git-fixes).
- ALSA: pci/asihpi: remove 'set but not used' warning (git-fixes).
- ALSA: pci/asihpi: remove 'set but not used' warnings (git-fixes).
- ALSA: pci/au88x0: remove 'defined but not used' warnings (git-fixes).
- ALSA: pci/aw2-saa7146: remove 'set but not used' warning (git-fixes).
- ALSA: pci/ctxfi/ctatc: fix kernel-doc (git-fixes).
- ALSA: pci/ctxfi: fix kernel-doc warnings (git-fixes).
- ALSA: pci/echoaudio: remove 'set but not used' warning (git-fixes).
- ALSA: pci/emu10k1: remove 'set but not used' warning (git-fixes).
- ALSA: pci/es1938: remove 'set but not used' warning (git-fixes).
- ALSA: pci/fm801: fix kernel-doc (git-fixes).
- ALSA: pci/korg1212: remove 'set but not used' warnings (git-fixes).
- ALSA: pci/oxygen/xonar_wm87x6: remove always true condition (git-fixes).
- ALSA: pci/rme9652/hdspm: remove always true condition (git-fixes).
- ALSA: pci/via82xx: remove 'set but not used' warnings (git-fixes).
- ALSA: pcmcia/pdaudiocf: fix kernel-doc (git-fixes).
- ALSA: seq: oss: Serialize ioctls (git-fixes).
- ALSA: usb-audio: Add capture support for Saffire 6 (USB 1.1) (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for SSL2 (git-fixes).
- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (git-fixes).
- ALSA: usb-audio: add startech usb audio dock name (git-fixes).
- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (git-fixes).
- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (git-fixes).
- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (git-fixes).
- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (git-fixes).
- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).
- ALSA: usb-audio: Fix some typos (git-fixes).
- ALSA: usb-audio: fix spelling mistake 'buss' -> 'bus' (git-fixes).
- ALSA: usb-audio: ignore broken processing/extension unit (git-fixes).
- ALSA: usb-audio: Update documentation comment for MS2109 quirk (git-fixes).
- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (git-fixes).
- ALSA: usb/line6: remove 'defined but not used' warning (git-fixes).
- ALSA: vx_core: remove warning for empty loop body (git-fixes).
- ALSA: xen: remove 'set but not used' warning (git-fixes).
- ALSA: xen: Remove superfluous fall through comments (git-fixes).
- appletalk: Fix atalk_proc_init() return path (git-fixes).
- arm/arm64: Make use of the SMCCC 1.1 wrapper (bsc#1174906).
- arm/arm64: Provide a wrapper for SMCCC 1.1 calls (bsc#1174906).
- arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit() (bsc#1174906).
- arm64: armv8_deprecated: Fix undef_hook mask for thumb setend (bsc#1175180).
- arm64: cacheflush: Fix KGDB trap detection (bsc#1175188).
- arm64: csum: Fix handling of bad packets (bsc#1175192).
- arm64: dts: allwinner: a64: Remove unused SPDIF sound card (none bsc#1175016).
- arm64: dts: clearfog-gt-8k: set gigabit PHY reset deassert delay (bsc#1175347).
- arm64: dts: exynos: Fix silent hang after boot on Espresso (bsc#1175346).
- arm64: dts: imx8mm-evk: correct ldo1/ldo2 voltage range (none bsc#1175019).
- arm64: dts: imx8qxp-mek: Remove unexisting Ethernet PHY (bsc#1175345).
- arm64: dts: librem5-devkit: add a vbus supply to usb0 (none bsc#1175013).
- arm64: dts: ls1028a: delete extraneous #interrupt-cells for ENETC RCIE (none bsc#1175012).
- arm64: dts: qcom: msm8998-clamshell: Fix label on l15 regulator (git-fixes).
- arm64: dts: rockchip: fix rk3399-puma gmac reset gpio (none bsc#1175021).
- arm64: dts: rockchip: fix rk3399-puma vcc5v0-host gpio (none bsc#1175020).
- arm64: dts: rockchip: Rename dwc3 device nodes on rk3399 to make dtc happy (none bsc#1175015).
- arm64: dts: rockchip: Replace RK805 PMIC node name with 'pmic' on rk3328 boards (none bsc#1175014).
- arm64: dts: uDPU: fix broken ethernet (bsc#1175344).
- arm64: dts: uniphier: Set SCSSI clock and reset IDs for each channel (none bsc#1175011).
- arm64: errata: use arm_smccc_1_1_get_conduit() (bsc#1174906).
- arm64: Fix PTRACE_SYSEMU semantics (bsc#1175185).
- arm64: fix the flush_icache_range arguments in machine_kexec (bsc#1175184).
- arm64: hugetlb: avoid potential NULL dereference (bsc#1175183).
- arm64: hw_breakpoint: Do not invoke overflow handler on uaccess watchpoints (bsc#1175189).
- arm64: insn: Fix two bugs in encoding 32-bit logical immediates (bsc#1175186).
- arm64: kexec_file: print appropriate variable (bsc#1175187).
- arm64: kgdb: Fix single-step exception handling oops (bsc#1175191).
- arm64: Retrieve stolen time as paravirtualized guest (bsc#1172197 jsc#SLE-13593).
- arm64: tegra: Enable I2C controller for EEPROM (none bsc#1175010).
- arm64: tegra: Fix ethernet phy-mode for Jetson Xavier (none bsc#1175017).
- arm64: tegra: Fix flag for 64-bit resources in 'ranges' property (none bsc#1175018).
- arm64: tegra: Fix Tegra194 PCIe compatible string (none bsc#1175009).
- arm64: vdso: Add -fasynchronous-unwind-tables to cflags (bsc#1175182).
- arm64: vdso: do not free unallocated pages (bsc#1175181).
- arm: percpu.h: fix build error (git-fixes).
- arm: spectre-v2: use arm_smccc_1_1_get_conduit() (bsc#1174906).
- ASoC: fsl_sai: Fix value of FSL_SAI_CR1_RFW_MASK (git-fixes).
- ASoC: hdac_hda: fix deadlock after PCM open error (git-fixes).
- ASoC: Intel: bxt_rt298: add missing .owner field (git-fixes).
- ASoC: intel: Fix memleak in sst_media_open (git-fixes).
- ASoC: meson: axg-tdm-interface: fix link fmt setup (git-fixes).
- ASoC: meson: axg-tdmin: fix g12a skew (git-fixes).
- ASoC: meson: fixes the missed kfree() for axg_card_add_tdm_loopback (git-fixes).
- ASoC: msm8916-wcd-analog: fix register Interrupt offset (git-fixes).
- ASoC: q6afe-dai: mark all widgets registers as SND_SOC_NOPM (git-fixes).
- ASoC: q6routing: add dummy register read/write function (git-fixes).
- ASoC: SOF: nocodec: add missing .owner field (git-fixes).
- ASoC: wm8994: Avoid attempts to read unreadable registers (git-fixes).
- ath10k: Acquire tx_lock in tx error paths (git-fixes).
- ath10k: enable transmit data ack RSSI for QCA9884 (git-fixes).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).
- ath9k: Fix regression with Atheros 9271 (git-fixes).
- atm: fix atm_dev refcnt leaks in atmtcp_remove_persistent (git-fixes).
- AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).
- AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).
- AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).
- b43: Remove uninitialized_var() usage (git-fixes).
- bdc: Fix bug causing crash after multiple disconnects (git-fixes).
- bfq: fix blkio cgroup leakage v4 (bsc#1175775).
- block: Fix the type of 'sts' in bsg_queue_rq() (git-fixes).
- Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes).
- Bluetooth: btmtksdio: fix up firmware download sequence (git-fixes).
- Bluetooth: btusb: fix up firmware download sequence (git-fixes).
- Bluetooth: fix kernel oops in store_pending_adv_report (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (git-fixes).
- Bluetooth: Fix update of connection state in `hci_encrypt_cfm` (git-fixes).
- Bluetooth: hci_h5: Set HCI_UART_RESET_ON_INIT to correct flags (git-fixes).
- Bluetooth: hci_serdev: Only unregister device if it was registered (git-fixes).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (git-fixes).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (git-fixes).
- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (networking-stable-20_07_17).
- bnxt_en: Init ethtool link settings after reading updated PHY configuration (jsc#SLE-8371 bsc#1153274).
- bonding: fix active-backup failover for current ARP slave (bsc#1174771).
- bpf: Fix map leak in HASH_OF_MAPS map (bsc#1155518).
- bpf: net: Avoid copying sk_user_data of reuseport_array during sk_clone (bsc#1155518).
- bpf: net: Avoid incorrect bpf_sk_reuseport_detach call (bsc#1155518).
- bpfilter: fix up a sparse annotation (bsc#1155518).
- bpfilter: Initialize pos variable (bsc#1155518).
- bpfilter: reject kernel addresses (bsc#1155518).
- bpfilter: switch to kernel_write (bsc#1155518).
- brcmfmac: keep SDIO watchdog running when console_interval is non-zero (git-fixes).
- brcmfmac: set state of hanger slot to FREE when flushing PSQ (git-fixes).
- brcmfmac: Set timeout value when configuring power save (bsc#1173468).
- brcmfmac: To fix Bss Info flag definition Bug (git-fixes).
- btmrvl: Fix firmware filename for sd8977 chipset (git-fixes).
- btmrvl: Fix firmware filename for sd8997 chipset (git-fixes).
- btrfs: add helper to get the end offset of a file extent item (bsc#1175546).
- btrfs: avoid unnecessary splits when setting bits on an extent io tree (bsc#1175377).
- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).
- btrfs: delete the ordered isize update code (bsc#1175377).
- btrfs: do not set path->leave_spinning for truncate (bsc#1175377).
- btrfs: factor out inode items copy loop from btrfs_log_inode() (bsc#1175546).
- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).
- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).
- btrfs: fix block group leak when removing fails (bsc#1175149).
- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).
- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).
- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).
- btrfs: fix deadlock during fast fsync when logging prealloc extents beyond eof (bsc#1175377).
- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).
- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).
- btrfs: fix lost i_size update after cloning inline extent (bsc#1175377).
- btrfs: fix memory leaks after failure to lookup checksums during inode logging (bsc#1175550).
- btrfs: fix missing file extent item for hole after ranged fsync (bsc#1175546).
- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).
- btrfs: fix race between block group removal and block group creation (bsc#1175149).
- btrfs: fix race between shrinking truncate and fiemap (bsc#1175377).
- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).
- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).
- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).
- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).
- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).
- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).
- btrfs: introduce per-inode file extent tree (bsc#1175377).
- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).
- btrfs: make full fsyncs always operate on the entire file again (bsc#1175546).
- btrfs: make ranged full fsyncs more efficient (bsc#1175546).
- btrfs: move extent_io_tree defs to their own header (bsc#1175377).
- btrfs: Move free_pages_out label in inline extent handling branch in compress_file_range (bsc#1175263).
- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).
- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).
- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).
- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).
- btrfs: Remove delalloc_end argument from extent_clear_unlock_delalloc (bsc#1175149).
- btrfs: Remove leftover of in-band dedupe (bsc#1175149).
- btrfs: remove unnecessary delalloc mutex for inodes (bsc#1175377).
- btrfs: remove useless check for copy_items() return value (bsc#1175546).
- btrfs: Rename btrfs_join_transaction_nolock (bsc#1175377).
- btrfs: replace all uses of btrfs_ordered_update_i_size (bsc#1175377).
- btrfs: separate out the extent io init function (bsc#1175377).
- btrfs: separate out the extent leak code (bsc#1175377).
- btrfs: treat RWF_{,D}SYNC writes as sync for CRCs (bsc#1175493).
- btrfs: trim: fix underflow in trim length to prevent access beyond device boundary (bsc#1175263).
- btrfs: use btrfs_ordered_update_i_size in clone_finish_inode_update (bsc#1175377).
- btrfs: use the file extent tree infrastructure (bsc#1175377).
- cfg80211: check vendor command doit pointer before use (git-fixes).
- clk: actions: Fix h_clk for Actions S500 SoC (git-fixes).
- clk: at91: clk-generated: check best_rate against ranges (git-fixes).
- clk: at91: clk-generated: continue if __clk_determine_rate() returns error (git-fixes).
- clk: at91: sam9x60-pll: check fcore against ranges (git-fixes).
- clk: at91: sam9x60-pll: use logical or for range check (git-fixes).
- clk: at91: sam9x60: fix main rc oscillator frequency (git-fixes).
- clk: at91: sckc: register slow_rc with accuracy option (git-fixes).
- clk: bcm2835: Do not use prediv with bcm2711's PLLs (bsc#1174865).
- clk: bcm63xx-gate: fix last clock availability (git-fixes).
- clk: clk-atlas6: fix return value check in atlas6_clk_init() (git-fixes).
- clk: iproc: round clock rate to the closest (git-fixes).
- clk: qcom: gcc-sdm660: Add missing modem reset (git-fixes).
- clk: qcom: gcc-sdm660: Fix up gcc_mss_mnoc_bimc_axi_clk (git-fixes).
- clk: rockchip: Revert 'fix wrong mmc sample phase shift for rk3328' (git-fixes).
- clk: scmi: Fix min and max rate when registering clocks with discrete rates (git-fixes).
- clk: spear: Remove uninitialized_var() usage (git-fixes).
- clk: st: Remove uninitialized_var() usage (git-fixes).
- console: newport_con: fix an issue about leak related system resources (git-fixes).
- cpumap: Use non-locked version __ptr_ring_consume_batched (git-fixes).
- crc-t10dif: Fix potential crypto notify dead-lock (git-fixes).
- crypto: aesni - add compatibility with IAS (git-fixes).
- crypto: aesni - Fix build with LLVM_IAS=1 (git-fixes).
- crypto: caam - Fix argument type in handle_imx6_err005766 (git-fixes).
- crypto: ccp - Fix use of merged scatterlists (git-fixes).
- crypto: ccree - fix resource leak on error path (git-fixes).
- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).
- crypto: hisilicon - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).
- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).
- devlink: ignore -EOPNOTSUPP errors on dumpit (bsc#1154353).
- devres: keep both device name and resource name in pretty name (git-fixes).
- dlm: Fix kobject memleak (bsc#1175768).
- dlm: remove BUG() before panic() (git-fixes).
- dmaengine: fsl-edma: fix wrong tcd endianness for big-endian cpu (git-fixes).
- dmaengine: ioat setting ioat timeout as module parameter (git-fixes).
- dmaengine: tegra210-adma: Fix runtime PM imbalance on error (git-fixes).
- docs: fix memory.low description in cgroup-v2.rst (git-fixes). (SLE documentation might refer to cgroup-v2.rst.)
- drbd: Remove uninitialized_var() usage (git-fixes).
- driver core: Avoid binding drivers to dead devices (git-fixes).
- drivers/firmware/psci: Fix memory leakage in alloc_init_cpu_groups() (git-fixes).
- drivers/net/wan: lapb: Corrected the usage of skb_cow (git-fixes).
- drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175128).
- drm/amd/display: Fix EDID parsing after resume from suspend (git-fixes).
- drm/amd/display: fix pow() crashing when given base 0 (git-fixes).
- drm/amd/powerplay: fix a crash when overclocking Vega M (bsc#1152472)
- drm/amd/powerplay: fix a crash when overclocking Vega M (git-fixes).
- drm/amd/powerplay: fix compile error with ARCH=arc (git-fixes).
- drm/amdgpu/display bail early in dm_pp_get_static_clocks (git-fixes).
- drm/amdgpu/display: use blanked rather than plane state for sync (bsc#1152489) * refreshed for context changes * protect code with CONFIG_DRM_AMD_DC_DCN2_0
- drm/amdgpu/gfx10: fix race condition for kiq (git-fixes).
- drm/amdgpu: avoid dereferencing a NULL pointer (git-fixes).
- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (git-fixes).
- drm/amdgpu: fix preemption unit test (git-fixes).
- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).
- drm/arm: fix unintentional integer overflow on left shift (git-fixes).
- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1152472) * refreshed for context changes
- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).
- drm/bridge: ti-sn65dsi86: Clear old error bits before AUX transfers (git-fixes).
- drm/bridge: ti-sn65dsi86: Do not use kernel-doc comment for local array (git-fixes).
- drm/bridge: ti-sn65dsi86: Fix off-by-one error in clock choice (bsc#1152489) * refreshed for context changes
- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1152472) * move drm_mipi_dbi.c -> tinydrm/mipi-dbi.c
- drm/debugfs: fix plain echo to connector 'force' attribute (git-fixes).
- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).
- drm/etnaviv: fix ref count leak via pm_runtime_get_sync (git-fixes).
- drm/gem: Fix a leak in drm_gem_objects_lookup() (git-fixes).
- drm/i915/fbc: Fix fence_y_offset handling (bsc#1152489) * context changes
- drm/i915/gt: Close race between engine_park and intel_gt_retire_requests (git-fixes).
- drm/i915/gt: Flush submission tasklet before waiting/retiring (bsc#1174737).
- drm/i915/gt: Move new timelines to the end of active_list (git-fixes).
- drm/i915/gt: Only swap to a random sibling once upon creation (bsc#1152489) * context changes
- drm/i915/gt: Unlock engine-pm after queuing the kernel context switch (git-fixes).
- drm/i915: Actually emit the await_start (bsc#1174737).
- drm/i915: Copy across scheduler behaviour flags across submit fences (bsc#1174737).
- drm/i915: Do not poison i915_request.link on removal (bsc#1174737).
- drm/i915: Drop no-semaphore boosting (bsc#1174737).
- drm/i915: Eliminate the trylock for awaiting an earlier request (bsc#1174737).
- drm/i915: Flush execution tasklets before checking request status (bsc#1174737).
- drm/i915: Flush tasklet submission before sleeping on i915_request_wait (bsc#1174737).
- drm/i915: Ignore submit-fences on the same timeline (bsc#1174737).
- drm/i915: Improve the start alignment of bonded pairs (bsc#1174737).
- drm/i915: Keep track of request among the scheduling lists (bsc#1174737).
- drm/i915: Lock signaler timeline while navigating (bsc#1174737).
- drm/i915: Mark i915_request.timeline as a volatile, rcu pointer (bsc#1174737).
- drm/i915: Mark racy read of intel_engine_cs.saturated (bsc#1174737).
- drm/i915: Mark up unlocked update of i915_request.hwsp_seqno (bsc#1174737).
- drm/i915: Move cec_notifier to intel_hdmi_connector_unregister, v2. (bsc#1152489) * context changes
- drm/i915: Peel dma-fence-chains for await (bsc#1174737).
- drm/i915: Prevent using semaphores to chain up to external fences (bsc#1174737).
- drm/i915: Protect i915_request_await_start from early waits (bsc#1174737).
- drm/i915: Pull waiting on an external dma-fence into its routine (bsc#1174737).
- drm/i915: Rely on direct submission to the queue (bsc#1174737).
- drm/i915: Remove wait priority boosting (bsc#1174737).
- drm/i915: Reorder await_execution before await_request (bsc#1174737).
- drm/i915: Return early for await_start on same timeline (bsc#1174737).
- drm/i915: Use EAGAIN for trylock failures (bsc#1174737).
- drm/imx: fix use after free (git-fixes).
- drm/imx: imx-ldb: Disable both channels for split mode in enc->disable() (git-fixes).
- drm/imx: tve: fix regulator_disable error path (git-fixes).
- drm/ingenic: Fix incorrect assumption about plane->index (bsc#1152489) * refreshed for context changes
- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).
- drm/msm: ratelimit crtc event overflow error (git-fixes).
- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).
- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).
- drm/nouveau/i2c/g94-: increase NV_PMGR_DP_AUXCTL_TRANSACTREQ timeout (git-fixes).
- drm/nouveau/kms/nv50-: Fix disabling dithering (git-fixes).
- drm/nouveau: fix multiple instances of reference count leaks (git-fixes).
- drm/nouveau: fix reference count leak in nouveau_debugfs_strap_peek (git-fixes).
- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).
- drm/radeon: disable AGP by default (git-fixes).
- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).
- drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync (git-fixes).
- drm/stm: repair runtime power management (git-fixes).
- drm/tilcdc: fix leak & null ref in panel_connector_get_modes (git-fixes).
- drm/ttm/nouveau: do not call tt destroy callback on alloc failure (git-fixes bsc#1175232).
- drm/vgem: Replace opencoded version of drm_gem_dumb_map_offset() (bsc#1152489) * refreshed for context changes
- drm/vmwgfx: Fix two list_for_each loop exit tests (git-fixes).
- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (git-fixes).
- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (git-fixes).
- drm: hold gem reference until object is no longer accessed (git-fixes).
- drm: msm: a6xx: fix gpu failure after system resume (git-fixes).
- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).
- drm: sun4i: hdmi: Fix inverted HPD result (git-fixes).
- dyndbg: fix a BUG_ON in ddebug_describe_flags (git-fixes).
- enetc: Fix tx rings bitmap iteration range, irq handling (networking-stable-20_06_28).
- ext2: fix missing percpu_counter_inc (bsc#1175774).
- ext4: check journal inode extents more carefully (bsc#1173485).
- ext4: do not allow overlapping system zones (bsc#1173485).
- ext4: do not BUG on inconsistent journal feature (bsc#1171634).
- ext4: fix checking of directory entry validity for inline directories (bsc#1175771).
- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).
- fbdev: Detect integer underflow at 'struct fbcon_ops'->clear_margins (git-fixes).
- firmware/psci: use common SMCCC_CONDUIT_* (bsc#1174906).
- firmware: arm_scmi: Fix SCMI genpd domain probing (git-fixes).
- firmware: arm_scmi: Keep the discrete clock rates sorted (git-fixes).
- firmware: arm_sdei: use common SMCCC_CONDUIT_* (bsc#1174906).
- firmware: Fix a reference count leak (git-fixes).
- firmware: smccc: Add ARCH_SOC_ID support (bsc#1174906).
- firmware: smccc: Add function to fetch SMCCC version (bsc#1174906).
- firmware: smccc: Add HAVE_ARM_SMCCC_DISCOVERY to identify SMCCC v1.1 and above (bsc#1174906).
- firmware: smccc: Add the definition for SMCCCv1.2 version/error codes (bsc#1174906).
- firmware: smccc: Drop smccc_version enum and use ARM_SMCCC_VERSION_1_x instead (bsc#1174906).
- firmware: smccc: Refactor SMCCC specific bits into separate file (bsc#1174906).
- firmware: smccc: Update link to latest SMCCC specification (bsc#1174906).
- firmware_loader: fix memory leak for paged buffer (bsc#1175367).
- fpga: dfl: fix bug in port reset handshake (git-fixes).
- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175176).
- fuse: fix weird page warning (bsc#1175175).
- genetlink: remove genl_bind (networking-stable-20_07_17).
- geneve: fix an uninitialized value in geneve_changelink() (git-fixes).
- genirq/affinity: Improve __irq_build_affinity_masks() (bsc#1174897 ltc#187090).
- genirq/affinity: Remove const qualifier from node_to_cpumask argument (bsc#1174897 ltc#187090).
- genirq/affinity: Spread vectors on node according to nr_cpu ratio (bsc#1174897 ltc#187090).
- gfs2: Another gfs2_find_jhead fix (bsc#1174824).
- gfs2: fix gfs2_find_jhead that returns uninitialized jhead with seq 0 (bsc#1174825).
- go7007: add sanity checking for endpoints (git-fixes).
- gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).
- gpio: arizona: put pm_runtime in case of failure (git-fixes).
- gpio: max77620: Fix missing release of interrupt (git-fixes).
- gpu: host1x: debug: Fix multiple channels emitting messages simultaneously (git-fixes).
- habanalabs: increase timeout during reset (git-fixes).
- HID: alps: support devices with report id 2 (git-fixes).
- HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).
- HID: i2c-hid: add Mediacom FlexBook edge13 to descriptor override (git-fixes).
- HID: input: Fix devices that return multiple bytes in battery report (git-fixes).
- HID: steam: fixes race in handling device list (git-fixes).
- hippi: Fix a size used in a 'pci_free_consistent()' in an error handling path (git-fixes).
- hwmon: (adm1275) Make sure we are reading enough data for different chips (git-fixes).
- hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).
- hwmon: (nct6775) Accept PECI Calibration as temperature source for NCT6798D (git-fixes).
- hwmon: (scmi) Fix potential buffer overflow in scmi_hwmon_probe() (git-fixes).
- i2c: also convert placeholder function to return errno (git-fixes).
- i2c: i2c-qcom-geni: Fix DMA transfer race (git-fixes).
- i2c: i801: Add support for Intel Comet Lake PCH-V (jsc#SLE-13411).
- i2c: i801: Add support for Intel Emmitsburg PCH (jsc#SLE-13411).
- i2c: i801: Add support for Intel Tiger Lake PCH-H (jsc#SLE-13411).
- i2c: iproc: fix race between client unreg and isr (git-fixes).
- i2c: rcar: always clear ICSAR to avoid side effects (git-fixes).
- i2c: rcar: avoid race when unregistering slave (git-fixes).
- i2c: rcar: slave: only send STOP event when we have been addressed (git-fixes).
- i2c: slave: add sanity check when unregistering (git-fixes).
- i2c: slave: improve sanity check when registering (git-fixes).
- i40iw: Do an RCU lookup in i40iw_add_ipv4_addr (git-fixes).
- i40iw: Fix error handling in i40iw_manage_arp_cache() (git-fixes).
- i40iw: fix null pointer dereference on a null wqe pointer (git-fixes).
- i40iw: Report correct firmware version (git-fixes).
- IB/cma: Fix ports memory leak in cma_configfs (git-fixes).
- IB/core: Fix potential NULL pointer dereference in pkey cache (git-fixes).
- IB/hfi1, qib: Ensure RCU is locked when accessing list (git-fixes).
- IB/hfi1: Ensure pq is not left on waitlist (git-fixes).
- IB/hfi1: Fix memory leaks in sysfs registration and unregistration (git-fixes).
- IB/ipoib: Fix double free of skb in case of multicast traffic in CM mode (git-fixes).
- IB/mad: Fix use after free when destroying MAD agent (git-fixes).
- IB/mlx4: Test return value of calls to ib_get_cached_pkey (git-fixes).
- IB/mlx5: Fix 50G per lane indication (git-fixes).
- IB/mlx5: Fix DEVX support for MLX5_CMD_OP_INIT2INIT_QP command (git-fixes).
- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (git-fixes).
- IB/mlx5: Replace tunnel mpls capability bits for tunnel_offloads (git-fixes).
- IB/qib: Call kobject_put() when kobject_init_and_add() fails (git-fixes).
- IB/rdmavt: Always return ERR_PTR from rvt_create_mmap_info() (git-fixes).
- IB/rdmavt: Delete unused routine (git-fixes).
- IB/rdmavt: Fix RQ counting issues causing use of an invalid RWQE (bsc#1174770).
- IB/sa: Resolv use-after-free in ib_nl_make_request() (git-fixes).
- ibmveth: Fix use of ibmveth in a bridge (bsc#1174387 ltc#187506).
- ibmvnic fix NULL tx_pools and rx_tools issue at do_reset (bsc#1175873 ltc#187922).
- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).
- ice: Clear and free XLT entries on reset (jsc#SLE-7926).
- ice: Graceful error handling in HW table calloc failure (jsc#SLE-7926).
- ide: Remove uninitialized_var() usage (git-fixes).
- ieee802154: fix one possible memleak in adf7242_probe (git-fixes).
- igc: Fix PTP initialization (bsc#1160634).
- iio: improve IIO_CONCENTRATION channel type description (git-fixes).
- Input: elan_i2c - only increment wakeup count on touch (git-fixes).
- Input: psmouse - add a newline when printing 'proto' by sysfs (git-fixes).
- Input: sentelic - fix error return when fsp_reg_write fails (git-fixes).
- Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).
- integrity: remove redundant initialization of variable ret (git-fixes).
- io-mapping: indicate mapping failure (git-fixes).
- ionic: fix up filter locks and debug msgs (bsc#1167773).
- ionic: keep rss hash after fw update (bsc#1167773).
- ionic: unlock queue mutex in error path (bsc#1167773).
- ionic: update filter id after replay (bsc#1167773).
- ionic: use mutex to protect queue operations (bsc#1167773).
- ionic: use offset for ethtool regs data (bsc#1167773).
- ip6_gre: fix null-ptr-deref in ip6gre_init_net() (git-fixes).
- ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() (networking-stable-20_06_28).
- ip_tunnel: fix use-after-free in ip_tunnel_lookup() (networking-stable-20_06_28).
- ipv4: fill fl4_icmp_{type,code} in ping_v4_sendmsg (networking-stable-20_07_17).
- ipv6: fib6_select_path can not use out path for nexthop objects (networking-stable-20_07_17).
- ipv6: Fix use of anycast address with loopback (networking-stable-20_07_17).
- ipvs: fix the connection sync failed in some cases (bsc#1174699).
- irqchip/gic: Atomically update affinity (bsc#1175195).
- iwlegacy: Check the return value of pcie_capability_read_*() (git-fixes).
- jbd2: add the missing unlock_buffer() in the error path of jbd2_write_superblock() (bsc#1175772).
- kABI workaround for enum cpuhp_state (git-fixes).
- kABI workaround for struct kvm_device (git-fixes). Just change an variable to 'const' type in kvm_device.
- kABI workaround for struct kvm_vcpu_arch (git-fixes). Add a struct variable to the end of kvm_vcpu_arch and kvm_vcpu_arch is embedded into kvm_vcpu at the end. It is usually used by pointer and allocated dynamically, so this change should be fine even for external kvm module.
- kABI/severities: ignore KABI for NVMe, except nvme-fc (bsc#1174777) Exported symbols under drivers/nvme/host/ are only used by the nvme subsystem itself, except for the nvme-fc symbols.
- kABI/severities: ignore qla2xxx as all symbols are internal
- kABI: genetlink: remove genl_bind (kabi).
- kABI: restore signature of xfrm_policy_bysel_ctx() and xfrm_policy_byid() (bsc#1174645).
- kernel.h: remove duplicate include of asm/div64.h (git-fixes).
- kernel/relay.c: fix memleak on destroy relay channel (git-fixes).
- kernfs: do not call fsnotify() with name without a parent (bsc#1175770).
- kobject: Avoid premature parent object freeing in kobject_cleanup() (git-fixes).
- KVM: Allow kvm_device_ops to be const (bsc#1172197 jsc#SLE-13593).
- KVM: arm/arm64: Correct AArch32 SPSR on exception entry (bsc#1133021).
- KVM: arm/arm64: Correct CPSR on exception entry (bsc#1133021).
- KVM: arm/arm64: Factor out hypercall handling from PSCI code (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Annotate hyp NMI-related functions as __always_inline (bsc#1175190).
- KVM: arm64: Correct PSTATE on exception entry (bsc#1133021).
- KVM: arm64: Document PV-time interface (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Fix 32bit PC wrap-around (bsc#1133021).
- KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Make vcpu_cp1x() work on Big Endian hosts (bsc#1133021).
- KVM: arm64: Provide VCPU attributes for stolen time (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than SCHEDSTATS (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART (bsc#1133021).
- KVM: arm64: Stop writing aarch32's CSSELR into ACTLR (bsc#1133021).
- KVM: arm64: Support stolen time reporting via shared structure (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Use the correct timer structure to access the physical counter (bsc#1133021).
- KVM: arm: vgic: Fix limit condition when writing to GICD_IACTIVER (bsc#1133021).
- KVM: Implement kvm_put_guest() (bsc#1172197 jsc#SLE-13593).
- KVM: Play nice with read-only memslots when querying host page size (bsc#1133021).
- KVM: PPC: Book3S PR: Remove uninitialized_var() usage (bsc#1065729).
- KVM: Reinstall old memslots if arch preparation fails (bsc#1133021).
- KVM: s390: Remove false WARN_ON_ONCE for the PQAP instruction (bsc#1133021).
- KVM: x86: Fix APIC page invalidation race (bsc#1133021).
- l2tp: remove skb_dst_set() from l2tp_xmit_skb() (networking-stable-20_07_17).
- leds: 88pm860x: fix use-after-free on unbind (git-fixes).
- leds: core: Flush scheduled work for system suspend (git-fixes).
- leds: da903x: fix use-after-free on unbind (git-fixes).
- leds: gpio: Fix semantic error (git-fixes).
- leds: lm3533: fix use-after-free on unbind (git-fixes).
- leds: lm355x: avoid enum conversion warning (git-fixes).
- leds: lm36274: fix use-after-free on unbind (git-fixes).
- leds: wm831x-status: fix use-after-free on unbind (git-fixes).
- libbpf: Wrap source argument of BPF_CORE_READ macro in parentheses (bsc#1155518).
- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).
- llc: make sure applications use ARPHRD_ETHER (networking-stable-20_07_17).
- locktorture: Print ratio of acquisitions, not failures (bsc#1149032).
- mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).
- mac80211: fix misplaced while instead of if (git-fixes).
- mac80211: mesh: Free ie data when leaving mesh (git-fixes).
- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).
- Mark the SLE15-SP2 kernel properly released. There perhaps was a typo, when SUSE_KERNEL_RELEASED missed the trailing 'D' - this leads to our kernels being marked as 'Unreleased kernel'. SUSE_KERNEL_RELEASED is defined in rpm/kernel-binary.spec.in. To fix that, it should be enough to switch from SUSE_KERNEL_RELEASE to SUSE_KERNEL_RELEASED.
- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (git-fixes).
- md/raid5: Fix Force reconstruct-write io stuck in degraded raid5 (git-fixes).
- media: budget-core: Improve exception handling in budget_register() (git-fixes).
- media: camss: fix memory leaks on error handling paths in probe (git-fixes).
- media: cxusb-analog: fix V4L2 dependency (git-fixes).
- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).
- media: firewire: Using uninitialized values in node_probe() (git-fixes).
- media: marvell-ccic: Add missed v4l2_async_notifier_cleanup() (git-fixes).
- media: media-request: Fix crash if memory allocation fails (git-fixes).
- media: nuvoton-cir: remove setting tx carrier functions (git-fixes).
- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).
- media: rockchip: rga: Introduce color fmt macros and refactor CSC mode logic (git-fixes).
- media: rockchip: rga: Only set output CSC mode for RGB input (git-fixes).
- media: sur40: Remove uninitialized_var() usage (git-fixes).
- media: vpss: clean up resources in init (git-fixes).
- media: vsp1: dl: Fix NULL pointer dereference on unbind (git-fixes).
- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).
- mfd: dln2: Run event handler loop under spinlock (git-fixes).
- mfd: intel-lpss: Add Intel Tiger Lake PCH-H PCI IDs (jsc#SLE-13411).
- mld: fix memory leak in ipv6_mc_destroy_dev() (networking-stable-20_06_28).
- mlxsw: core: Fix wrong SFP EEPROM reading for upper pages 1-3 (bsc#1154488).
- mlxsw: pci: Fix use-after-free in case of failed devlink reload (networking-stable-20_07_17).
- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (networking-stable-20_07_17).
- mm, vmstat: reduce zone->lock holding time by /proc/pagetypeinfo (bsc#1175691).
- mm/vunmap: add cond_resched() in vunmap_pmd_range (bsc#1175654 ltc#184617).
- mm: filemap: clear idle flag for writes (bsc#1175769).
- mm: Fix protection usage propagation (bsc#1174002).
- mmc: sdhci-cadence: do not use hardware tuning for SD mode (git-fixes).
- mmc: sdhci-pci-o2micro: Bug fix for O2 host controller Seabird1 (git-fixes).
- mtd: properly check all write ioctls for permissions (git-fixes).
- mtd: rawnand: fsl_upm: Remove unused mtd var (git-fixes).
- mtd: rawnand: qcom: avoid write to unavailable register (git-fixes).
- mvpp2: ethtool rxtx stats fix (networking-stable-20_06_28).
- mwifiex: Fix firmware filename for sd8977 chipset (git-fixes).
- mwifiex: Fix firmware filename for sd8997 chipset (git-fixes).
- mwifiex: Prevent memory corruption handling keys (git-fixes).
- ndctl/papr_scm,uapi: Add support for PAPR nvdimm specific methods (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- net, sk_msg: Clear sk_user_data pointer on clone if tagged (bsc#1155518).
- net, sk_msg: Do not use RCU_INIT_POINTER on sk_user_data (bsc#1155518).
- net/bpfilter: Initialize pos in __bpfilter_process_sockopt (bsc#1155518).
- net/bpfilter: split __bpfilter_process_sockopt (bsc#1155518).
- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).
- net/mlx5: DR, Change push vlan action sequence (jsc#SLE-8464).
- net/mlx5: E-switch, Destroy TSAR when fail to enable the mode (jsc#SLE-8464).
- net/mlx5: Fix eeprom support for SFP module (networking-stable-20_07_17).
- net/mlx5e: Fix 50G per lane indication (networking-stable-20_07_17).
- net/mlx5e: Fix kernel crash when setting vf VLANID on a VF dev (jsc#SLE-8464).
- net: Added pointer check for dst->ops->neigh_lookup in dst_neigh_lookup_skb (networking-stable-20_07_17).
- net: bridge: enfore alignment for ethernet address (networking-stable-20_06_28).
- net: core: reduce recursion limit value (networking-stable-20_06_28).
- net: Do not clear the sock TX queue in sk_set_socket() (networking-stable-20_06_28).
- net: dsa: microchip: set the correct number of ports (networking-stable-20_07_17).
- net: ena: add reserved PCI device ID (bsc#1174852).
- net: ena: add support for reporting of packet drops (bsc#1174852).
- net: ena: add support for the rx offset feature (bsc#1174852).
- net: ena: add support for traffic mirroring (bsc#1174852).
- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).
- net: ena: allow setting the hash function without changing the key (bsc#1174852).
- net: ena: avoid memory access violation by validating req_id properly (bsc#1174852).
- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).
- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).
- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).
- net: ena: Change WARN_ON expression in ena_del_napi_in_range() (bsc#1154492).
- net: ena: changes to RSS hash key allocation (bsc#1174852).
- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).
- net: ena: cosmetic: code reorderings (bsc#1174852).
- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).
- net: ena: cosmetic: fix line break issues (bsc#1174852).
- net: ena: cosmetic: fix spacing issues (bsc#1174852).
- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).
- net: ena: cosmetic: minor code changes (bsc#1174852).
- net: ena: cosmetic: remove unnecessary code (bsc#1174852).
- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).
- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).
- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).
- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).
- net: ena: drop superfluous prototype (bsc#1174852).
- net: ena: enable support of rss hash key and function changes (bsc#1174852).
- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).
- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).
- net: ena: fix continuous keep-alive resets (bsc#1174852).
- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).
- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).
- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).
- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).
- net: ena: Make missed_tx stat incremental (git-fixes).
- net: ena: Make some functions static (bsc#1174852).
- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).
- net: ena: Prevent reset after device destruction (git-fixes).
- net: ena: reduce driver load time (bsc#1174852).
- net: ena: remove code that does nothing (bsc#1174852).
- net: ena: remove set but not used variable 'hash_key' (bsc#1174852).
- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).
- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).
- net: ena: support new LLQ acceleration mode (bsc#1174852).
- net: ena: use explicit variable size for clarity (bsc#1174852).
- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).
- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)
- net: fix memleak in register_netdevice() (networking-stable-20_06_28).
- net: Fix the arp error in some cases (networking-stable-20_06_28).
- net: hns3: fix error handling for desc filling (git-fixes).
- net: hns3: fix for not calculating TX BD send size correctly (git-fixes).
- net: hns3: fix return value error when query MAC link status fail (git-fixes).
- net: increment xmit_recursion level in dev_direct_xmit() (networking-stable-20_06_28).
- net: lan78xx: add missing endpoint sanity check (git-fixes).
- net: lan78xx: fix transfer-buffer memory leak (git-fixes).
- net: lan78xx: replace bogus endpoint lookup (git-fixes).
- net: mvneta: fix use of state->speed (networking-stable-20_07_17).
- net: phy: Check harder for errors in get_phy_id() (git-fixes).
- net: phy: fix memory leak in device-create error path (git-fixes).
- net: qrtr: Fix an out of bounds read qrtr_endpoint_post() (networking-stable-20_07_17).
- net: usb: ax88179_178a: fix packet alignment padding (networking-stable-20_06_28).
- net: usb: qmi_wwan: add support for Quectel EG95 LTE modem (networking-stable-20_07_17).
- net_sched: fix a memory leak in atm_tc_init() (networking-stable-20_07_17).
- netdevsim: fix unbalaced locking in nsim_create() (git-fixes).
- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).
- nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).
- ntb: Fix static check warning in perf_clear_test (git-fixes).
- ntb: Fix the default port and peer numbers for legacy drivers (git-fixes).
- ntb: hw: remove the code that sets the DMA mask (git-fixes).
- ntb: ntb_pingpong: Choose doorbells based on port number (git-fixes).
- ntb: ntb_test: Fix bug when counting remote files (git-fixes).
- ntb: ntb_tool: reading the link file should not end in a NULL byte (git-fixes).
- ntb: perf: Do not require one more memory window than number of peers (git-fixes).
- ntb: perf: Fix race condition when run with ntb_test (git-fixes).
- ntb: perf: Fix support for hardware that does not have port numbers (git-fixes).
- ntb: Revert the change to use the NTB device dev for DMA allocations (git-fixes).
- ntb_perf: pass correct struct device to dma_alloc_coherent (git-fixes).
- ntb_tool: pass correct struct device to dma_alloc_coherent (git-fixes).
- nvme-multipath: do not fall back to __nvme_find_path() for non-optimized paths (bsc#1172108).
- nvme-multipath: fix logic for non-optimized paths (bsc#1172108).
- nvme-multipath: round-robin: eliminate 'fallback' variable (bsc#1172108).
- nvme-multipath: set bdi capabilities once (bsc#1159058).
- nvme-pci: Re-order nvme_pci_free_ctrl (bsc#1159058).
- nvme-rdma: Add warning on state change failure at (bsc#1159058).
- nvme-tcp: Add warning on state change failure at (bsc#1159058).
- nvme-tcp: fix possible crash in write_zeroes processing (bsc#1159058).
- nvme: add a Identify Namespace Identification Descriptor list quirk (git-fixes).
- nvme: always search for namespace head (bsc#1159058).
- nvme: avoid an Identify Controller command for each namespace (bsc#1159058).
- nvme: check namespace head shared property (bsc#1159058).
- nvme: clean up nvme_scan_work (bsc#1159058).
- nvme: cleanup namespace identifier reporting in (bsc#1159058).
- nvme: consolidate chunk_sectors settings (bsc#1159058).
- nvme: consolodate io settings (bsc#1159058).
- nvme: expose hostid via sysfs for fabrics controllers (bsc#1159058).
- nvme: expose hostnqn via sysfs for fabrics controllers (bsc#1159058).
- nvme: factor out a nvme_ns_remove_by_nsid helper (bsc#1159058).
- nvme: fix a crash in nvme_mpath_add_disk (git-fixes, bsc#1159058).
- nvme: Fix controller creation races with teardown flow (bsc#1159058).
- nvme: Fix ctrl use-after-free during sysfs deletion (bsc#1159058).
- nvme: fix identify error status silent ignore (git-fixes, bsc#1159058).
- nvme: fix possible hang when ns scanning fails during error (bsc#1159058).
- nvme: kABI fixes for nvme_ctrl (bsc#1159058).
- nvme: Make nvme_uninit_ctrl symmetric to nvme_init_ctrl (bsc#1159058).
- nvme: multipath: round-robin: fix single non-optimized path case (bsc#1172108).
- nvme: prevent double free in nvme_alloc_ns() error handling (bsc#1159058).
- nvme: provide num dword helper (bsc#1159058).
- nvme: refactor nvme_identify_ns_descs error handling (bsc#1159058).
- nvme: refine the Qemu Identify CNS quirk (bsc#1159058).
- nvme: release ida resources (bsc#1159058).
- nvme: release namespace head reference on error (bsc#1159058).
- nvme: remove the magic 1024 constant in nvme_scan_ns_list (bsc#1159058).
- nvme: remove unused parameter (bsc#1159058).
- nvme: Remove unused return code from nvme_delete_ctrl_sync (bsc#1159058).
- nvme: rename __nvme_find_ns_head to nvme_find_ns_head (bsc#1159058).
- nvme: revalidate after verifying identifiers (bsc#1159058).
- nvme: revalidate namespace stream parameters (bsc#1159058).
- nvme: unlink head after removing last namespace (bsc#1159058).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: fix remounting needed after setfacl command (bsc#1173954).
- ocfs2: load global_inode_alloc (bsc#1172963).
- omapfb: dss: Fix max fclk divider for omap36xx (git-fixes).
- openvswitch: take into account de-fragmentation/gso_size in execute_check_pkt_len (networking-stable-20_06_28).
- PCI/ASPM: Add missing newline in sysfs 'policy' (git-fixes).
- PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes).
- PCI: cadence: Fix updating Vendor ID and Subsystem Vendor ID register (git-fixes).
- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).
- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).
- PCI: hv: Fix a timing issue which causes kdump to fail occasionally (bsc#1172871, git-fixes).
- PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).
- PCI: qcom: Add missing reset for ipq806x (git-fixes).
- PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).
- PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).
- PCI: rcar: Fix runtime PM imbalance on error (git-fixes).
- PCI: Release IVRS table in AMD ACS quirk (git-fixes).
- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).
- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).
- PCI: tegra: Revert tegra124 raw_violation_fixup (git-fixes).
- phy: armada-38x: fix NETA lockup when repeatedly switching speeds (git-fixes).
- phy: exynos5-usbdrd: Calibrating makes sense only for USB2.0 PHY (git-fixes).
- phy: renesas: rcar-gen3-usb2: move irq registration to init (git-fixes).
- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).
- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).
- pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).
- pinctrl: ingenic: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).
- pinctrl: single: fix function name in documentation (git-fixes).
- platform/chrome: cros_ec_ishtp: Fix a double-unlock issue (git-fixes).
- platform/x86: asus-nb-wmi: add support for ASUS ROG Zephyrus G14 and G15 (git-fixes).
- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).
- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).
- platform/x86: ISST: Add new PCI device ids (git-fixes).
- PM: wakeup: Show statistics for deleted wakeup sources again (git-fixes).
- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).
- powerpc/64s: Do not init FSCR_DSCR in __init_FSCR() (bsc#1065729).
- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).
- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).
- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).
- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).
- powerpc/fadump: Fix build error with CONFIG_PRESERVE_FA_DUMP=y (bsc#1156395).
- powerpc/iommu: Allow bypass-only for DMA (bsc#1156395).
- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).
- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).
- powerpc/papr_scm: Add support for fetching nvdimm 'fuel-gauge' metric (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Fetch nvdimm health information from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Fetch nvdimm performance stats from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Implement support for PAPR_PDSM_HEALTH (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Improve error logging and handling papr_scm_ndctl() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Mark papr_scm_ndctl() as static (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/perf: Fix missing is_sier_aviable() during build (bsc#1065729).
- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).
- powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU death (bsc#1085030 ltC#165630).
- powerpc/pseries: Do not initiate shutdown when system is running on UPS (bsc#1175440 ltc#187574).
- powerpc/pseries: PCIE PHB reset (bsc#1174689).
- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).
- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).
- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).
- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).
- powerpc: Document details on H_SCM_HEALTH hcall (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- pseries: Fix 64 bit logical memory block panic (bsc#1065729).
- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).
- qed: suppress 'do not support RoCE & iWARP' flooding on HW init (git-fixes).
- qed: suppress false-positives interrupt error messages on HW init (git-fixes).
- r8169: fix jumbo configuration for RTL8168evl (bsc#1175296).
- r8169: fix jumbo packet handling on resume from suspend (bsc#1175296).
- r8169: fix resume on cable plug-in (bsc#1175296).
- r8169: fix rtl_hw_jumbo_disable for RTL8168evl (bsc#1175296).
- r8169: move disabling interrupt coalescing to RTL8169/RTL8168 init (bsc#1175296).
- r8169: read common register for PCI commit (bsc#1175296).
- random32: move the pseudo-random 32-bit definitions to prandom.h (git-fixes).
- random32: remove net_rand_state from the latent entropy gcc plugin (git-fixes).
- random: fix circular include dependency on arm64 after addition of percpu.h (git-fixes).
- RDMA/cm: Add missing locking around id.state in cm_dup_req_handler (git-fixes).
- RDMA/cm: Fix an error check in cm_alloc_id_priv() (git-fixes).
- RDMA/cm: Fix checking for allowed duplicate listens (git-fixes).
- RDMA/cm: Fix ordering of xa_alloc_cyclic() in ib_create_cm_id() (git-fixes).
- RDMA/cm: Read id.state under lock when doing pr_debug() (git-fixes).
- RDMA/cm: Remove a race freeing timewait_info (git-fixes).
- RDMA/cm: Update num_paths in cma_resolve_iboe_route error flow (git-fixes).
- RDMA/cma: Protect bind_list and listen_list while finding matching cm id (git-fixes).
- RDMA/core: Fix double destruction of uobject (git-fixes).
- RDMA/core: Fix double put of resource (git-fixes).
- RDMA/core: Fix missing error check on dev_set_name() (git-fixes).
- RDMA/core: Fix protection fault in ib_mr_pool_destroy (git-fixes).
- RDMA/core: Fix race between destroy and release FD object (git-fixes).
- RDMA/core: Fix race in rdma_alloc_commit_uobject() (git-fixes).
- RDMA/core: Prevent mixed use of FDs between shared ufiles (git-fixes).
- RDMA/counter: Query a counter before release (git-fixes).
- RDMA/efa: Set maximum pkeys device attribute (git-fixes).
- RDMA/hns: Bugfix for querying qkey (git-fixes).
- RDMA/hns: Fix cmdq parameter of querying pf timer resource (git-fixes).
- RDMA/iw_cxgb4: Fix incorrect function parameters (git-fixes).
- RDMA/iwcm: Fix iwcm work deallocation (git-fixes).
- RDMA/mad: Do not crash if the rdma device does not have a umad interface (git-fixes).
- RDMA/mad: Fix possible memory leak in ib_mad_post_receive_mads() (git-fixes).
- RDMA/mlx4: Initialize ib_spec on the stack (git-fixes).
- RDMA/mlx5: Add init2init as a modify command (git-fixes).
- RDMA/mlx5: Add missing srcu_read_lock in ODP implicit flow (jsc#SLE-8446).
- RDMA/mlx5: Fix access to wrong pointer while performing flush due to error (git-fixes).
- RDMA/mlx5: Fix prefetch memory leak if get_prefetchable_mr fails (jsc#SLE-8446).
- RDMA/mlx5: Fix the number of hwcounters of a dynamic counter (git-fixes).
- RDMA/mlx5: Fix typo in enum name (git-fixes).
- RDMA/mlx5: Fix udata response upon SRQ creation (git-fixes).
- RDMA/mlx5: Prevent prefetch from racing with implicit destruction (jsc#SLE-8446).
- RDMA/mlx5: Set GRH fields in query QP on RoCE (git-fixes).
- RDMA/mlx5: Use xa_lock_irq when access to SRQ table (git-fixes).
- RDMA/mlx5: Verify that QP is created with RQ or SQ (git-fixes).
- RDMA/nldev: Fix crash when set a QP to a new counter but QPN is missing (git-fixes).
- RDMA/pvrdma: Fix missing pci disable in pvrdma_pci_probe() (git-fixes).
- RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (git-fixes).
- RDMA/rvt: Fix potential memory leak caused by rvt_alloc_rq (git-fixes).
- RDMA/rxe: Always return ERR_PTR from rxe_create_mmap_info() (git-fixes).
- RDMA/rxe: Fix configuration of atomic queue pair attributes (git-fixes).
- RDMA/rxe: Set default vendor ID (git-fixes).
- RDMA/rxe: Set sys_image_guid to be aligned with HW IB devices (git-fixes).
- RDMA/siw: Fix failure handling during device creation (git-fixes).
- RDMA/siw: Fix passive connection establishment (git-fixes).
- RDMA/siw: Fix pointer-to-int-cast warning in siw_rx_pbl() (git-fixes).
- RDMA/siw: Fix potential siw_mem refcnt leak in siw_fastreg_mr() (git-fixes).
- RDMA/siw: Fix reporting vendor_part_id (git-fixes).
- RDMA/siw: Fix setting active_mtu attribute (git-fixes).
- RDMA/siw: Fix setting active_{speed, width} attributes (git-fixes).
- RDMA/ucma: Put a lock around every call to the rdma_cm layer (git-fixes).
- RDMA/uverbs: Fix create WQ to use the given user handle (git-fixes).
- regmap: debugfs: check count when read regmap file (git-fixes).
- regmap: dev_get_regmap_match(): fix string comparison (git-fixes).
- regulator: gpio: Honor regulator-boot-on property (git-fixes).
- remoteproc: qcom: q6v5: Update running state before requesting stop (git-fixes).
- remoteproc: qcom_q6v5_mss: Validate MBA firmware size before load (git-fixes).
- remoteproc: qcom_q6v5_mss: Validate modem blob firmware size before load (git-fixes).
- Revert 'ALSA: hda: call runtime_allow() for all hda controllers' (git-fixes).
- Revert 'drm/amd/display: Expose connector VRR range via debugfs' (bsc#1152489) * refreshed for context changes
- Revert 'drm/amdgpu: Fix NULL dereference in dpm sysfs handlers' (git-fixes).
- Revert 'i2c: cadence: Fix the hold bit setting' (git-fixes).
- Revert 'RDMA/cma: Simplify rdma_resolve_addr() error flow' (git-fixes).
- Revert 'scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe' (bsc#1171688 bsc#1174003).
- Revert 'scsi: qla2xxx: Fix crash on qla2x00_mailbox_command' (bsc#1171688 bsc#1174003).
- rhashtable: Document the right function parameters (bsc#1174880).
- rhashtable: drop duplicated word in <linux/rhashtable.h> (bsc#1174880).
- rhashtable: Drop raw RCU deref in nested_table_free (bsc#1174880).
- rhashtable: Fix unprotected RCU dereference in __rht_ptr (bsc#1174880).
- rhashtable: Restore RCU marking on rhash_lock_head (bsc#1174880).
- RMDA/cm: Fix missing ib_cm_destroy_id() in ib_cm_insert_listen() (git-fixes).
- rocker: fix incorrect error handling in dma_rings_init (networking-stable-20_06_28).
- rpm/modules.fips: * add ecdh_generic (boo#1173813)
- rtc: goldfish: Enable interrupt in set_alarm() when necessary (git-fixes).
- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).
- rtnetlink: Fix memory(net_device) leak when ->newlink fails (bsc#1154353).
- rtnetlink: Fix memory(net_device) leak when ->newlink fails (git-fixes).
- rtw88: fix LDPC field for RA info (git-fixes).
- rtw88: fix short GI capability based on current bandwidth (git-fixes).
- sch_cake: do not call diffserv parsing code when it is not needed (networking-stable-20_06_28).
- sch_cake: do not try to reallocate or unshare skb unconditionally (networking-stable-20_06_28).
- sched: consistently handle layer3 header accesses in the presence of VLANs (networking-stable-20_07_17).
- scsi/fc: kABI fixes for new ELS_RPD definition (bsc#1171688 bsc#1174003).
- scsi: dh: Add Fujitsu device to devinfo and dh lists (bsc#1174026).
- scsi: Fix trivial spelling (bsc#1171688 bsc#1174003).
- scsi: ipr: Fix softlockup when rescanning devices in petitboot (jsc#SLE-13654).
- scsi: ipr: remove unneeded semicolon (jsc#SLE-13654).
- scsi: ipr: Use scnprintf() for avoiding potential buffer overflow (jsc#SLE-13654).
- scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Address a set of sparse warnings (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change {RD,WRT}_REG_*() function names from upper case into lower case (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in header files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in source files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix issue with adapter's stopping state (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix login timeout (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix null pointer access during disconnect from subsystem (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix spelling of a variable name (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix warning after FC target reset (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush all sessions on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush I/O on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Initialize 'n' before using it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce noisy debug message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove a superfluous cast (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove an unused function (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: SAN congestion management implementation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use register names instead of register offsets (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for ha->fw_dumped (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1171688 bsc#1174003).
- scsi: smartpqi: add id support for SmartRAID 3152-8i (bsc#1172418).
- scsi: smartpqi: add RAID bypass counter (bsc#1172418).
- scsi: smartpqi: avoid crashing kernel for controller issues (bsc#1172418).
- scsi: smartpqi: bump version to 1.2.16-010 (bsc#1172418).
- scsi: smartpqi: Identify physical devices without issuing INQUIRY (bsc#1172418).
- scsi: smartpqi: support device deletion via sysfs (bsc#1172418).
- scsi: smartpqi: update logical volume size after expansion (bsc#1172418).
- scsi: smartpqi: Use scnprintf() for avoiding potential buffer overflow (bsc#1172418).
- scsi: target/iblock: fix WRITE SAME zeroing (bsc#1169790).
- sctp: Do not advertise IPv4 addresses if ipv6only is set on the socket (networking-stable-20_06_28).
- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).
- seq_buf: Export seq_buf_printf (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- serial: 8250: change lock order in serial8250_do_startup() (git-fixes).
- serial: 8250: fix null-ptr-deref in serial8250_start_tx() (git-fixes).
- serial: 8250_mtk: Fix high-speed baud rates clamping (git-fixes).
- serial: 8250_pci: Move Pericom IDs to pci_ids.h (git-fixes).
- serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes).
- serial: exar: Fix GPIO configuration for Sealevel cards based on XR17V35X (git-fixes).
- serial: mxs-auart: add missed iounmap() in probe failure and remove (git-fixes).
- serial: pl011: Do not leak amba_ports entry on driver register error (git-fixes).
- serial: pl011: Fix oops on -EPROBE_DEFER (git-fixes).
- serial: tegra: fix CREAD handling for PIO (git-fixes).
- soc/tegra: pmc: Enable PMIC wake event on Tegra194 (bsc#1175834).
- soc/tegra: pmc: Enable PMIC wake event on Tegra210 (bsc#1175116).
- soc: qcom: rpmh-rsc: Set suppress_bind_attrs flag (git-fixes).
- spi: davinci: Remove uninitialized_var() usage (git-fixes).
- spi: lantiq-ssc: Fix warning by using WQ_MEM_RECLAIM (git-fixes).
- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).
- spi: mediatek: use correct SPI_CFG2_REG MACRO (git-fixes).
- spi: pxa2xx: Add support for Intel Tiger Lake PCH-H (jsc#SLE-13411).
- spi: rockchip: Fix error in SPI slave pio read (git-fixes).
- spi: spi-geni-qcom: Actually use our FIFO (git-fixes).
- spi: spidev: Align buffers for DMA (git-fixes).
- spi: stm32: fixes suspend/resume management (git-fixes).
- spi: sun4i: update max transfer size reported (git-fixes).
- staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).
- Staging: rtl8188eu: rtw_mlme: Fix uninitialized variable authmode (git-fixes).
- staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).
- staging: rtl8712: handle firmware load failure (git-fixes).
- staging: vchiq_arm: Add a matching unregister call (git-fixes).
- staging: wlan-ng: properly check endpoint types (git-fixes).
- tcp: do not ignore ECN CWR on pure ACK (networking-stable-20_06_28).
- tcp: fix SO_RCVLOWAT possible hangs under high mem pressure (networking-stable-20_07_17).
- tcp: grow window for OOO packets only for SACK flows (networking-stable-20_06_28).
- tcp: make sure listeners do not initialize congestion-control state (networking-stable-20_07_17).
- tcp: md5: add missing memory barriers in tcp_md5_do_add()/tcp_md5_hash_key() (networking-stable-20_07_17).
- tcp: md5: do not send silly options in SYNCOOKIES (networking-stable-20_07_17).
- tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key() barriers (networking-stable-20_07_17).
- tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT (networking-stable-20_06_28).
- thermal: ti-soc-thermal: Fix reversed condition in ti_thermal_expose_sensor() (git-fixes).
- tpm: Require that all digests are present in TCG_PCR_EVENT2 structures (git-fixes).
- tpm_crb: fix fTPM on AMD Zen+ CPUs (bsc#1174362).
- tracepoint: Mark __tracepoint_string's __used (git-fixes).
- tracing: Use trace_sched_process_free() instead of exit() for pid tracing (git-fixes).
- ubsan: check panic_on_warn (bsc#1174805).
- uio_pdrv_genirq: Remove warning when irq is not specified (bsc#1174762).
- update upstream reference
- usb: bdc: Halt controller on suspend (git-fixes).
- usb: core: fix quirks_param_set() writing to a const pointer (git-fixes).
- usb: dwc2: gadget: Make use of GINTMSK2 (git-fixes).
- usb: dwc3: pci: add support for the Intel Jasper Lake (git-fixes).
- usb: dwc3: pci: add support for the Intel Tiger Lake PCH -H variant (git-fixes).
- usb: gadget: f_uac2: fix AC Interface Header Descriptor wTotalLength (git-fixes).
- usb: gadget: net2280: fix memory leak on probe error handling paths (git-fixes).
- usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes).
- usb: hso: check for return value in hso_serial_common_create() (git-fixes).
- usb: hso: Fix debug compile warning on sparc32 (git-fixes).
- usb: iowarrior: fix up report size handling for some devices (git-fixes).
- usb: mtu3: clear dual mode of u3port when disable device (git-fixes).
- usb: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).
- usb: serial: cp210x: re-enable auto-RTS on open (git-fixes).
- usb: serial: iuu_phoenix: fix led-activity helpers (git-fixes).
- usb: serial: qcserial: add EM7305 QDL product ID (git-fixes).
- usb: tegra: Fix allocation for the FPCI context (git-fixes).
- usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).
- usb: xhci: define IDs for various ASMedia host controllers (git-fixes).
- usb: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).
- usb: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).
- usbip: tools: fix module name in man page (git-fixes).
- video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes).
- video: fbdev: savage: fix memory leak on error handling path in probe (git-fixes).
- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).
- video: pxafb: Fix the function used to balance a 'dma_alloc_coherent()' call (git-fixes).
- vlan: consolidate VLAN parsing code and limit max parsing depth (networking-stable-20_07_17).
- vmxnet3: use correct tcp hdr length when packet is encapsulated (bsc#1175199).
- vt: Reject zero-sized screen buffer size (git-fixes).
- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (git-fixes).
- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (git-fixes).
- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (git-fixes).
- watchdog: initialize device before misc_register (git-fixes).
- wireless: Use linux/stddef.h instead of stddef.h (git-fixes).
- wireless: Use offsetof instead of custom macro (git-fixes).
- wl1251: fix always return 0 error (git-fixes).
- x86/bugs/multihit: Fix mitigation reporting when VMX is not in use (git-fixes).
- xen/pvcalls-back: test for errors when calling backend_connect() (bsc#1065600).
- xfrm: fix a warning in xfrm_policy_insert_list (bsc#1174645).
- xfrm: policy: match with both mark and mask on user interfaces (bsc#1174645).
- xfs: do not eat an EIO/ENOSPC writeback error when scrubbing data fork (git-fixes).
- xfs: fix inode allocation block res calculation precedence (git-fixes).
- xfs: fix reflink quota reservation accounting error (git-fixes).
- xfs: preserve rmapbt swapext block reservation from freed blocks (git-fixes).
Patchnames
SUSE-2020-2486,SUSE-SLE-Module-Basesystem-15-SP2-2020-2486,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2486,SUSE-SLE-Module-Legacy-15-SP2-2020-2486,SUSE-SLE-Module-Live-Patching-15-SP2-2020-2486,SUSE-SLE-Product-HA-15-SP2-2020-2486,SUSE-SLE-Product-WE-15-SP2-2020-2486
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-14314: Fixed a potential negative array index in ext4 (bsc#1173798).\n- CVE-2020-14331: Fixed a missing check in scrollback handling (bsc#1174205 bsc#1174247).\n- CVE-2020-14356: Fixed a NULL pointer dereference in the cgroupv2 subsystem (bsc#1175213).\n- CVE-2020-16166: Fixed an information leak in the network RNG (bsc#1174757).\n\nThe following non-security bugs were fixed:\n\n- 9p/trans_fd: Fix concurrency del of req_list in p9_fd_cancelled/p9_read_work (git-fixes).\n- ACPICA: Do not increment operation_region reference counts for field units (git-fixes).\n- af_key: pfkey_dump needs parameter validation (git-fixes).\n- agp/intel: Fix a memory leak on module initialisation failure (git-fixes).\n- ALSA: atmel: Remove invalid \u0027fall through\u0027 comments (git-fixes).\n- ALSA: core: pcm_iec958: fix kernel-doc (git-fixes).\n- ALSA: echoaduio: Drop superfluous volatile modifier (git-fixes).\n- ALSA: echoaudio: Address bugs in the interrupt handling (git-fixes).\n- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (git-fixes).\n- ALSA: echoaudio: Prevent races in calls to set_audio_format() (git-fixes).\n- ALSA: echoaudio: Prevent some noise on unloading the module (git-fixes).\n- ALSA: echoaudio: Race conditions around \u0027opencount\u0027 (git-fixes).\n- ALSA: echoaudio: re-enable IRQs on failure path (git-fixes).\n- ALSA: echoaudio: Remove redundant check (git-fixes).\n- ALSA: firewire: fix kernel-doc (git-fixes).\n- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (git-fixes).\n- ALSA: hda - reverse the setting value in the micmute_led_set (git-fixes).\n- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (git-fixes).\n- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (git-fixes).\n- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (git-fixes).\n- ALSA: hda/hdmi: Add quirk to force connectivity (git-fixes).\n- ALSA: hda/hdmi: Fix keep_power assignment for non-component devices (git-fixes).\n- ALSA: hda/hdmi: Use force connectivity quirk on another HP desktop (git-fixes).\n- ALSA: hda/realtek - Fix unused variable warning (git-fixes).\n- ALSA: hda/realtek - Fixed HP right speaker no sound (git-fixes).\n- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (git-fixes).\n- ALSA: hda/realtek: Add model alc298-samsung-headphone (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex Book (git-fixes).\n- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (git-fixes).\n- ALSA: hda/realtek: Fix add a \u0027ultra_low_power\u0027 function for intel reference board (alc256) (git-fixes).\n- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (git-fixes).\n- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (git-fixes).\n- ALSA: hda/tegra: Disable sync-write operation (git-fixes).\n- ALSA: hda: Add support for Loongson 7A1000 controller (git-fixes).\n- ALSA: hda: avoid reset of sdo_limit (git-fixes).\n- ALSA: hda: Enable sync-write operation as default for all controllers (git-fixes).\n- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).\n- ALSA: hda: fix snd_hda_codec_cleanup() documentation (git-fixes).\n- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).\n- ALSA: isa/gus: remove \u0027set but not used\u0027 warning (git-fixes).\n- ALSA: isa/gus: remove -Wmissing-prototypes warnings (git-fixes).\n- ALSA: isa: fix spelling mistakes in the comments (git-fixes).\n- ALSA: line6: add hw monitor volume control for POD HD500 (git-fixes).\n- ALSA: line6: Use kmemdup in podhd_set_monitor_level() (git-fixes).\n- ALSA: pci/asihpi: fix kernel-doc (git-fixes).\n- ALSA: pci/asihpi: remove \u0027set but not used\u0027 warning (git-fixes).\n- ALSA: pci/asihpi: remove \u0027set but not used\u0027 warnings (git-fixes).\n- ALSA: pci/au88x0: remove \u0027defined but not used\u0027 warnings (git-fixes).\n- ALSA: pci/aw2-saa7146: remove \u0027set but not used\u0027 warning (git-fixes).\n- ALSA: pci/ctxfi/ctatc: fix kernel-doc (git-fixes).\n- ALSA: pci/ctxfi: fix kernel-doc warnings (git-fixes).\n- ALSA: pci/echoaudio: remove \u0027set but not used\u0027 warning (git-fixes).\n- ALSA: pci/emu10k1: remove \u0027set but not used\u0027 warning (git-fixes).\n- ALSA: pci/es1938: remove \u0027set but not used\u0027 warning (git-fixes).\n- ALSA: pci/fm801: fix kernel-doc (git-fixes).\n- ALSA: pci/korg1212: remove \u0027set but not used\u0027 warnings (git-fixes).\n- ALSA: pci/oxygen/xonar_wm87x6: remove always true condition (git-fixes).\n- ALSA: pci/rme9652/hdspm: remove always true condition (git-fixes).\n- ALSA: pci/via82xx: remove \u0027set but not used\u0027 warnings (git-fixes).\n- ALSA: pcmcia/pdaudiocf: fix kernel-doc (git-fixes).\n- ALSA: seq: oss: Serialize ioctls (git-fixes).\n- ALSA: usb-audio: Add capture support for Saffire 6 (USB 1.1) (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for SSL2 (git-fixes).\n- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (git-fixes).\n- ALSA: usb-audio: add startech usb audio dock name (git-fixes).\n- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (git-fixes).\n- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (git-fixes).\n- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (git-fixes).\n- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (git-fixes).\n- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).\n- ALSA: usb-audio: Fix some typos (git-fixes).\n- ALSA: usb-audio: fix spelling mistake \u0027buss\u0027 -\u003e \u0027bus\u0027 (git-fixes).\n- ALSA: usb-audio: ignore broken processing/extension unit (git-fixes).\n- ALSA: usb-audio: Update documentation comment for MS2109 quirk (git-fixes).\n- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (git-fixes).\n- ALSA: usb/line6: remove \u0027defined but not used\u0027 warning (git-fixes).\n- ALSA: vx_core: remove warning for empty loop body (git-fixes).\n- ALSA: xen: remove \u0027set but not used\u0027 warning (git-fixes).\n- ALSA: xen: Remove superfluous fall through comments (git-fixes).\n- appletalk: Fix atalk_proc_init() return path (git-fixes).\n- arm/arm64: Make use of the SMCCC 1.1 wrapper (bsc#1174906).\n- arm/arm64: Provide a wrapper for SMCCC 1.1 calls (bsc#1174906).\n- arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit() (bsc#1174906).\n- arm64: armv8_deprecated: Fix undef_hook mask for thumb setend (bsc#1175180).\n- arm64: cacheflush: Fix KGDB trap detection (bsc#1175188).\n- arm64: csum: Fix handling of bad packets (bsc#1175192).\n- arm64: dts: allwinner: a64: Remove unused SPDIF sound card (none bsc#1175016).\n- arm64: dts: clearfog-gt-8k: set gigabit PHY reset deassert delay (bsc#1175347).\n- arm64: dts: exynos: Fix silent hang after boot on Espresso (bsc#1175346).\n- arm64: dts: imx8mm-evk: correct ldo1/ldo2 voltage range (none bsc#1175019).\n- arm64: dts: imx8qxp-mek: Remove unexisting Ethernet PHY (bsc#1175345).\n- arm64: dts: librem5-devkit: add a vbus supply to usb0 (none bsc#1175013).\n- arm64: dts: ls1028a: delete extraneous #interrupt-cells for ENETC RCIE (none bsc#1175012).\n- arm64: dts: qcom: msm8998-clamshell: Fix label on l15 regulator (git-fixes).\n- arm64: dts: rockchip: fix rk3399-puma gmac reset gpio (none bsc#1175021).\n- arm64: dts: rockchip: fix rk3399-puma vcc5v0-host gpio (none bsc#1175020).\n- arm64: dts: rockchip: Rename dwc3 device nodes on rk3399 to make dtc happy (none bsc#1175015).\n- arm64: dts: rockchip: Replace RK805 PMIC node name with \u0027pmic\u0027 on rk3328 boards (none bsc#1175014).\n- arm64: dts: uDPU: fix broken ethernet (bsc#1175344).\n- arm64: dts: uniphier: Set SCSSI clock and reset IDs for each channel (none bsc#1175011).\n- arm64: errata: use arm_smccc_1_1_get_conduit() (bsc#1174906).\n- arm64: Fix PTRACE_SYSEMU semantics (bsc#1175185).\n- arm64: fix the flush_icache_range arguments in machine_kexec (bsc#1175184).\n- arm64: hugetlb: avoid potential NULL dereference (bsc#1175183).\n- arm64: hw_breakpoint: Do not invoke overflow handler on uaccess watchpoints (bsc#1175189).\n- arm64: insn: Fix two bugs in encoding 32-bit logical immediates (bsc#1175186).\n- arm64: kexec_file: print appropriate variable (bsc#1175187).\n- arm64: kgdb: Fix single-step exception handling oops (bsc#1175191).\n- arm64: Retrieve stolen time as paravirtualized guest (bsc#1172197 jsc#SLE-13593).\n- arm64: tegra: Enable I2C controller for EEPROM (none bsc#1175010).\n- arm64: tegra: Fix ethernet phy-mode for Jetson Xavier (none bsc#1175017).\n- arm64: tegra: Fix flag for 64-bit resources in \u0027ranges\u0027 property (none bsc#1175018).\n- arm64: tegra: Fix Tegra194 PCIe compatible string (none bsc#1175009).\n- arm64: vdso: Add -fasynchronous-unwind-tables to cflags (bsc#1175182).\n- arm64: vdso: do not free unallocated pages (bsc#1175181).\n- arm: percpu.h: fix build error (git-fixes).\n- arm: spectre-v2: use arm_smccc_1_1_get_conduit() (bsc#1174906).\n- ASoC: fsl_sai: Fix value of FSL_SAI_CR1_RFW_MASK (git-fixes).\n- ASoC: hdac_hda: fix deadlock after PCM open error (git-fixes).\n- ASoC: Intel: bxt_rt298: add missing .owner field (git-fixes).\n- ASoC: intel: Fix memleak in sst_media_open (git-fixes).\n- ASoC: meson: axg-tdm-interface: fix link fmt setup (git-fixes).\n- ASoC: meson: axg-tdmin: fix g12a skew (git-fixes).\n- ASoC: meson: fixes the missed kfree() for axg_card_add_tdm_loopback (git-fixes).\n- ASoC: msm8916-wcd-analog: fix register Interrupt offset (git-fixes).\n- ASoC: q6afe-dai: mark all widgets registers as SND_SOC_NOPM (git-fixes).\n- ASoC: q6routing: add dummy register read/write function (git-fixes).\n- ASoC: SOF: nocodec: add missing .owner field (git-fixes).\n- ASoC: wm8994: Avoid attempts to read unreadable registers (git-fixes).\n- ath10k: Acquire tx_lock in tx error paths (git-fixes).\n- ath10k: enable transmit data ack RSSI for QCA9884 (git-fixes).\n- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).\n- ath9k: Fix regression with Atheros 9271 (git-fixes).\n- atm: fix atm_dev refcnt leaks in atmtcp_remove_persistent (git-fixes).\n- AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).\n- AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).\n- AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).\n- b43: Remove uninitialized_var() usage (git-fixes).\n- bdc: Fix bug causing crash after multiple disconnects (git-fixes).\n- bfq: fix blkio cgroup leakage v4 (bsc#1175775).\n- block: Fix the type of \u0027sts\u0027 in bsg_queue_rq() (git-fixes).\n- Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes).\n- Bluetooth: btmtksdio: fix up firmware download sequence (git-fixes).\n- Bluetooth: btusb: fix up firmware download sequence (git-fixes).\n- Bluetooth: fix kernel oops in store_pending_adv_report (git-fixes).\n- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (git-fixes).\n- Bluetooth: Fix update of connection state in `hci_encrypt_cfm` (git-fixes).\n- Bluetooth: hci_h5: Set HCI_UART_RESET_ON_INIT to correct flags (git-fixes).\n- Bluetooth: hci_serdev: Only unregister device if it was registered (git-fixes).\n- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (git-fixes).\n- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (git-fixes).\n- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (networking-stable-20_07_17).\n- bnxt_en: Init ethtool link settings after reading updated PHY configuration (jsc#SLE-8371 bsc#1153274).\n- bonding: fix active-backup failover for current ARP slave (bsc#1174771).\n- bpf: Fix map leak in HASH_OF_MAPS map (bsc#1155518).\n- bpf: net: Avoid copying sk_user_data of reuseport_array during sk_clone (bsc#1155518).\n- bpf: net: Avoid incorrect bpf_sk_reuseport_detach call (bsc#1155518).\n- bpfilter: fix up a sparse annotation (bsc#1155518).\n- bpfilter: Initialize pos variable (bsc#1155518).\n- bpfilter: reject kernel addresses (bsc#1155518).\n- bpfilter: switch to kernel_write (bsc#1155518).\n- brcmfmac: keep SDIO watchdog running when console_interval is non-zero (git-fixes).\n- brcmfmac: set state of hanger slot to FREE when flushing PSQ (git-fixes).\n- brcmfmac: Set timeout value when configuring power save (bsc#1173468).\n- brcmfmac: To fix Bss Info flag definition Bug (git-fixes).\n- btmrvl: Fix firmware filename for sd8977 chipset (git-fixes).\n- btmrvl: Fix firmware filename for sd8997 chipset (git-fixes).\n- btrfs: add helper to get the end offset of a file extent item (bsc#1175546).\n- btrfs: avoid unnecessary splits when setting bits on an extent io tree (bsc#1175377).\n- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).\n- btrfs: delete the ordered isize update code (bsc#1175377).\n- btrfs: do not set path-\u003eleave_spinning for truncate (bsc#1175377).\n- btrfs: factor out inode items copy loop from btrfs_log_inode() (bsc#1175546).\n- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).\n- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).\n- btrfs: fix block group leak when removing fails (bsc#1175149).\n- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).\n- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).\n- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).\n- btrfs: fix deadlock during fast fsync when logging prealloc extents beyond eof (bsc#1175377).\n- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).\n- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).\n- btrfs: fix lost i_size update after cloning inline extent (bsc#1175377).\n- btrfs: fix memory leaks after failure to lookup checksums during inode logging (bsc#1175550).\n- btrfs: fix missing file extent item for hole after ranged fsync (bsc#1175546).\n- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).\n- btrfs: fix race between block group removal and block group creation (bsc#1175149).\n- btrfs: fix race between shrinking truncate and fiemap (bsc#1175377).\n- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).\n- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).\n- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).\n- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).\n- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).\n- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).\n- btrfs: introduce per-inode file extent tree (bsc#1175377).\n- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).\n- btrfs: make full fsyncs always operate on the entire file again (bsc#1175546).\n- btrfs: make ranged full fsyncs more efficient (bsc#1175546).\n- btrfs: move extent_io_tree defs to their own header (bsc#1175377).\n- btrfs: Move free_pages_out label in inline extent handling branch in compress_file_range (bsc#1175263).\n- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).\n- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).\n- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).\n- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).\n- btrfs: Remove delalloc_end argument from extent_clear_unlock_delalloc (bsc#1175149).\n- btrfs: Remove leftover of in-band dedupe (bsc#1175149).\n- btrfs: remove unnecessary delalloc mutex for inodes (bsc#1175377).\n- btrfs: remove useless check for copy_items() return value (bsc#1175546).\n- btrfs: Rename btrfs_join_transaction_nolock (bsc#1175377).\n- btrfs: replace all uses of btrfs_ordered_update_i_size (bsc#1175377).\n- btrfs: separate out the extent io init function (bsc#1175377).\n- btrfs: separate out the extent leak code (bsc#1175377).\n- btrfs: treat RWF_{,D}SYNC writes as sync for CRCs (bsc#1175493).\n- btrfs: trim: fix underflow in trim length to prevent access beyond device boundary (bsc#1175263).\n- btrfs: use btrfs_ordered_update_i_size in clone_finish_inode_update (bsc#1175377).\n- btrfs: use the file extent tree infrastructure (bsc#1175377).\n- cfg80211: check vendor command doit pointer before use (git-fixes).\n- clk: actions: Fix h_clk for Actions S500 SoC (git-fixes).\n- clk: at91: clk-generated: check best_rate against ranges (git-fixes).\n- clk: at91: clk-generated: continue if __clk_determine_rate() returns error (git-fixes).\n- clk: at91: sam9x60-pll: check fcore against ranges (git-fixes).\n- clk: at91: sam9x60-pll: use logical or for range check (git-fixes).\n- clk: at91: sam9x60: fix main rc oscillator frequency (git-fixes).\n- clk: at91: sckc: register slow_rc with accuracy option (git-fixes).\n- clk: bcm2835: Do not use prediv with bcm2711\u0027s PLLs (bsc#1174865).\n- clk: bcm63xx-gate: fix last clock availability (git-fixes).\n- clk: clk-atlas6: fix return value check in atlas6_clk_init() (git-fixes).\n- clk: iproc: round clock rate to the closest (git-fixes).\n- clk: qcom: gcc-sdm660: Add missing modem reset (git-fixes).\n- clk: qcom: gcc-sdm660: Fix up gcc_mss_mnoc_bimc_axi_clk (git-fixes).\n- clk: rockchip: Revert \u0027fix wrong mmc sample phase shift for rk3328\u0027 (git-fixes).\n- clk: scmi: Fix min and max rate when registering clocks with discrete rates (git-fixes).\n- clk: spear: Remove uninitialized_var() usage (git-fixes).\n- clk: st: Remove uninitialized_var() usage (git-fixes).\n- console: newport_con: fix an issue about leak related system resources (git-fixes).\n- cpumap: Use non-locked version __ptr_ring_consume_batched (git-fixes).\n- crc-t10dif: Fix potential crypto notify dead-lock (git-fixes).\n- crypto: aesni - add compatibility with IAS (git-fixes).\n- crypto: aesni - Fix build with LLVM_IAS=1 (git-fixes).\n- crypto: caam - Fix argument type in handle_imx6_err005766 (git-fixes).\n- crypto: ccp - Fix use of merged scatterlists (git-fixes).\n- crypto: ccree - fix resource leak on error path (git-fixes).\n- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).\n- crypto: hisilicon - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).\n- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).\n- devlink: ignore -EOPNOTSUPP errors on dumpit (bsc#1154353).\n- devres: keep both device name and resource name in pretty name (git-fixes).\n- dlm: Fix kobject memleak (bsc#1175768).\n- dlm: remove BUG() before panic() (git-fixes).\n- dmaengine: fsl-edma: fix wrong tcd endianness for big-endian cpu (git-fixes).\n- dmaengine: ioat setting ioat timeout as module parameter (git-fixes).\n- dmaengine: tegra210-adma: Fix runtime PM imbalance on error (git-fixes).\n- docs: fix memory.low description in cgroup-v2.rst (git-fixes). (SLE documentation might refer to cgroup-v2.rst.)\n- drbd: Remove uninitialized_var() usage (git-fixes).\n- driver core: Avoid binding drivers to dead devices (git-fixes).\n- drivers/firmware/psci: Fix memory leakage in alloc_init_cpu_groups() (git-fixes).\n- drivers/net/wan: lapb: Corrected the usage of skb_cow (git-fixes).\n- drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175128).\n- drm/amd/display: Fix EDID parsing after resume from suspend (git-fixes).\n- drm/amd/display: fix pow() crashing when given base 0 (git-fixes).\n- drm/amd/powerplay: fix a crash when overclocking Vega M (bsc#1152472)\n- drm/amd/powerplay: fix a crash when overclocking Vega M (git-fixes).\n- drm/amd/powerplay: fix compile error with ARCH=arc (git-fixes).\n- drm/amdgpu/display bail early in dm_pp_get_static_clocks (git-fixes).\n- drm/amdgpu/display: use blanked rather than plane state for sync (bsc#1152489) \t* refreshed for context changes \t* protect code with CONFIG_DRM_AMD_DC_DCN2_0\n- drm/amdgpu/gfx10: fix race condition for kiq (git-fixes).\n- drm/amdgpu: avoid dereferencing a NULL pointer (git-fixes).\n- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (git-fixes).\n- drm/amdgpu: fix preemption unit test (git-fixes).\n- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).\n- drm/arm: fix unintentional integer overflow on left shift (git-fixes).\n- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1152472) \t* refreshed for context changes\n- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).\n- drm/bridge: ti-sn65dsi86: Clear old error bits before AUX transfers (git-fixes).\n- drm/bridge: ti-sn65dsi86: Do not use kernel-doc comment for local array (git-fixes).\n- drm/bridge: ti-sn65dsi86: Fix off-by-one error in clock choice (bsc#1152489) \t* refreshed for context changes\n- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1152472) \t* move drm_mipi_dbi.c -\u003e tinydrm/mipi-dbi.c\n- drm/debugfs: fix plain echo to connector \u0027force\u0027 attribute (git-fixes).\n- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).\n- drm/etnaviv: fix ref count leak via pm_runtime_get_sync (git-fixes).\n- drm/gem: Fix a leak in drm_gem_objects_lookup() (git-fixes).\n- drm/i915/fbc: Fix fence_y_offset handling (bsc#1152489) \t* context changes\n- drm/i915/gt: Close race between engine_park and intel_gt_retire_requests (git-fixes).\n- drm/i915/gt: Flush submission tasklet before waiting/retiring (bsc#1174737).\n- drm/i915/gt: Move new timelines to the end of active_list (git-fixes).\n- drm/i915/gt: Only swap to a random sibling once upon creation (bsc#1152489) \t* context changes\n- drm/i915/gt: Unlock engine-pm after queuing the kernel context switch (git-fixes).\n- drm/i915: Actually emit the await_start (bsc#1174737).\n- drm/i915: Copy across scheduler behaviour flags across submit fences (bsc#1174737).\n- drm/i915: Do not poison i915_request.link on removal (bsc#1174737).\n- drm/i915: Drop no-semaphore boosting (bsc#1174737).\n- drm/i915: Eliminate the trylock for awaiting an earlier request (bsc#1174737).\n- drm/i915: Flush execution tasklets before checking request status (bsc#1174737).\n- drm/i915: Flush tasklet submission before sleeping on i915_request_wait (bsc#1174737).\n- drm/i915: Ignore submit-fences on the same timeline (bsc#1174737).\n- drm/i915: Improve the start alignment of bonded pairs (bsc#1174737).\n- drm/i915: Keep track of request among the scheduling lists (bsc#1174737).\n- drm/i915: Lock signaler timeline while navigating (bsc#1174737).\n- drm/i915: Mark i915_request.timeline as a volatile, rcu pointer (bsc#1174737).\n- drm/i915: Mark racy read of intel_engine_cs.saturated (bsc#1174737).\n- drm/i915: Mark up unlocked update of i915_request.hwsp_seqno (bsc#1174737).\n- drm/i915: Move cec_notifier to intel_hdmi_connector_unregister, v2. (bsc#1152489) \t* context changes\n- drm/i915: Peel dma-fence-chains for await (bsc#1174737).\n- drm/i915: Prevent using semaphores to chain up to external fences (bsc#1174737).\n- drm/i915: Protect i915_request_await_start from early waits (bsc#1174737).\n- drm/i915: Pull waiting on an external dma-fence into its routine (bsc#1174737).\n- drm/i915: Rely on direct submission to the queue (bsc#1174737).\n- drm/i915: Remove wait priority boosting (bsc#1174737).\n- drm/i915: Reorder await_execution before await_request (bsc#1174737).\n- drm/i915: Return early for await_start on same timeline (bsc#1174737).\n- drm/i915: Use EAGAIN for trylock failures (bsc#1174737).\n- drm/imx: fix use after free (git-fixes).\n- drm/imx: imx-ldb: Disable both channels for split mode in enc-\u003edisable() (git-fixes).\n- drm/imx: tve: fix regulator_disable error path (git-fixes).\n- drm/ingenic: Fix incorrect assumption about plane-\u003eindex (bsc#1152489) \t* refreshed for context changes\n- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).\n- drm/msm: ratelimit crtc event overflow error (git-fixes).\n- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).\n- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).\n- drm/nouveau/i2c/g94-: increase NV_PMGR_DP_AUXCTL_TRANSACTREQ timeout (git-fixes).\n- drm/nouveau/kms/nv50-: Fix disabling dithering (git-fixes).\n- drm/nouveau: fix multiple instances of reference count leaks (git-fixes).\n- drm/nouveau: fix reference count leak in nouveau_debugfs_strap_peek (git-fixes).\n- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).\n- drm/radeon: disable AGP by default (git-fixes).\n- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).\n- drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync (git-fixes).\n- drm/stm: repair runtime power management (git-fixes).\n- drm/tilcdc: fix leak \u0026 null ref in panel_connector_get_modes (git-fixes).\n- drm/ttm/nouveau: do not call tt destroy callback on alloc failure (git-fixes bsc#1175232).\n- drm/vgem: Replace opencoded version of drm_gem_dumb_map_offset() (bsc#1152489) \t* refreshed for context changes\n- drm/vmwgfx: Fix two list_for_each loop exit tests (git-fixes).\n- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (git-fixes).\n- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (git-fixes).\n- drm: hold gem reference until object is no longer accessed (git-fixes).\n- drm: msm: a6xx: fix gpu failure after system resume (git-fixes).\n- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).\n- drm: sun4i: hdmi: Fix inverted HPD result (git-fixes).\n- dyndbg: fix a BUG_ON in ddebug_describe_flags (git-fixes).\n- enetc: Fix tx rings bitmap iteration range, irq handling (networking-stable-20_06_28).\n- ext2: fix missing percpu_counter_inc (bsc#1175774).\n- ext4: check journal inode extents more carefully (bsc#1173485).\n- ext4: do not allow overlapping system zones (bsc#1173485).\n- ext4: do not BUG on inconsistent journal feature (bsc#1171634).\n- ext4: fix checking of directory entry validity for inline directories (bsc#1175771).\n- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).\n- fbdev: Detect integer underflow at \u0027struct fbcon_ops\u0027-\u003eclear_margins (git-fixes).\n- firmware/psci: use common SMCCC_CONDUIT_* (bsc#1174906).\n- firmware: arm_scmi: Fix SCMI genpd domain probing (git-fixes).\n- firmware: arm_scmi: Keep the discrete clock rates sorted (git-fixes).\n- firmware: arm_sdei: use common SMCCC_CONDUIT_* (bsc#1174906).\n- firmware: Fix a reference count leak (git-fixes).\n- firmware: smccc: Add ARCH_SOC_ID support (bsc#1174906).\n- firmware: smccc: Add function to fetch SMCCC version (bsc#1174906).\n- firmware: smccc: Add HAVE_ARM_SMCCC_DISCOVERY to identify SMCCC v1.1 and above (bsc#1174906).\n- firmware: smccc: Add the definition for SMCCCv1.2 version/error codes (bsc#1174906).\n- firmware: smccc: Drop smccc_version enum and use ARM_SMCCC_VERSION_1_x instead (bsc#1174906).\n- firmware: smccc: Refactor SMCCC specific bits into separate file (bsc#1174906).\n- firmware: smccc: Update link to latest SMCCC specification (bsc#1174906).\n- firmware_loader: fix memory leak for paged buffer (bsc#1175367).\n- fpga: dfl: fix bug in port reset handshake (git-fixes).\n- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175176).\n- fuse: fix weird page warning (bsc#1175175).\n- genetlink: remove genl_bind (networking-stable-20_07_17).\n- geneve: fix an uninitialized value in geneve_changelink() (git-fixes).\n- genirq/affinity: Improve __irq_build_affinity_masks() (bsc#1174897 ltc#187090).\n- genirq/affinity: Remove const qualifier from node_to_cpumask argument (bsc#1174897 ltc#187090).\n- genirq/affinity: Spread vectors on node according to nr_cpu ratio (bsc#1174897 ltc#187090).\n- gfs2: Another gfs2_find_jhead fix (bsc#1174824).\n- gfs2: fix gfs2_find_jhead that returns uninitialized jhead with seq 0 (bsc#1174825).\n- go7007: add sanity checking for endpoints (git-fixes).\n- gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).\n- gpio: arizona: put pm_runtime in case of failure (git-fixes).\n- gpio: max77620: Fix missing release of interrupt (git-fixes).\n- gpu: host1x: debug: Fix multiple channels emitting messages simultaneously (git-fixes).\n- habanalabs: increase timeout during reset (git-fixes).\n- HID: alps: support devices with report id 2 (git-fixes).\n- HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).\n- HID: i2c-hid: add Mediacom FlexBook edge13 to descriptor override (git-fixes).\n- HID: input: Fix devices that return multiple bytes in battery report (git-fixes).\n- HID: steam: fixes race in handling device list (git-fixes).\n- hippi: Fix a size used in a \u0027pci_free_consistent()\u0027 in an error handling path (git-fixes).\n- hwmon: (adm1275) Make sure we are reading enough data for different chips (git-fixes).\n- hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).\n- hwmon: (nct6775) Accept PECI Calibration as temperature source for NCT6798D (git-fixes).\n- hwmon: (scmi) Fix potential buffer overflow in scmi_hwmon_probe() (git-fixes).\n- i2c: also convert placeholder function to return errno (git-fixes).\n- i2c: i2c-qcom-geni: Fix DMA transfer race (git-fixes).\n- i2c: i801: Add support for Intel Comet Lake PCH-V (jsc#SLE-13411).\n- i2c: i801: Add support for Intel Emmitsburg PCH (jsc#SLE-13411).\n- i2c: i801: Add support for Intel Tiger Lake PCH-H (jsc#SLE-13411).\n- i2c: iproc: fix race between client unreg and isr (git-fixes).\n- i2c: rcar: always clear ICSAR to avoid side effects (git-fixes).\n- i2c: rcar: avoid race when unregistering slave (git-fixes).\n- i2c: rcar: slave: only send STOP event when we have been addressed (git-fixes).\n- i2c: slave: add sanity check when unregistering (git-fixes).\n- i2c: slave: improve sanity check when registering (git-fixes).\n- i40iw: Do an RCU lookup in i40iw_add_ipv4_addr (git-fixes).\n- i40iw: Fix error handling in i40iw_manage_arp_cache() (git-fixes).\n- i40iw: fix null pointer dereference on a null wqe pointer (git-fixes).\n- i40iw: Report correct firmware version (git-fixes).\n- IB/cma: Fix ports memory leak in cma_configfs (git-fixes).\n- IB/core: Fix potential NULL pointer dereference in pkey cache (git-fixes).\n- IB/hfi1, qib: Ensure RCU is locked when accessing list (git-fixes).\n- IB/hfi1: Ensure pq is not left on waitlist (git-fixes).\n- IB/hfi1: Fix memory leaks in sysfs registration and unregistration (git-fixes).\n- IB/ipoib: Fix double free of skb in case of multicast traffic in CM mode (git-fixes).\n- IB/mad: Fix use after free when destroying MAD agent (git-fixes).\n- IB/mlx4: Test return value of calls to ib_get_cached_pkey (git-fixes).\n- IB/mlx5: Fix 50G per lane indication (git-fixes).\n- IB/mlx5: Fix DEVX support for MLX5_CMD_OP_INIT2INIT_QP command (git-fixes).\n- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (git-fixes).\n- IB/mlx5: Replace tunnel mpls capability bits for tunnel_offloads (git-fixes).\n- IB/qib: Call kobject_put() when kobject_init_and_add() fails (git-fixes).\n- IB/rdmavt: Always return ERR_PTR from rvt_create_mmap_info() (git-fixes).\n- IB/rdmavt: Delete unused routine (git-fixes).\n- IB/rdmavt: Fix RQ counting issues causing use of an invalid RWQE (bsc#1174770).\n- IB/sa: Resolv use-after-free in ib_nl_make_request() (git-fixes).\n- ibmveth: Fix use of ibmveth in a bridge (bsc#1174387 ltc#187506).\n- ibmvnic fix NULL tx_pools and rx_tools issue at do_reset (bsc#1175873 ltc#187922).\n- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).\n- ice: Clear and free XLT entries on reset (jsc#SLE-7926).\n- ice: Graceful error handling in HW table calloc failure (jsc#SLE-7926).\n- ide: Remove uninitialized_var() usage (git-fixes).\n- ieee802154: fix one possible memleak in adf7242_probe (git-fixes).\n- igc: Fix PTP initialization (bsc#1160634).\n- iio: improve IIO_CONCENTRATION channel type description (git-fixes).\n- Input: elan_i2c - only increment wakeup count on touch (git-fixes).\n- Input: psmouse - add a newline when printing \u0027proto\u0027 by sysfs (git-fixes).\n- Input: sentelic - fix error return when fsp_reg_write fails (git-fixes).\n- Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).\n- integrity: remove redundant initialization of variable ret (git-fixes).\n- io-mapping: indicate mapping failure (git-fixes).\n- ionic: fix up filter locks and debug msgs (bsc#1167773).\n- ionic: keep rss hash after fw update (bsc#1167773).\n- ionic: unlock queue mutex in error path (bsc#1167773).\n- ionic: update filter id after replay (bsc#1167773).\n- ionic: use mutex to protect queue operations (bsc#1167773).\n- ionic: use offset for ethtool regs data (bsc#1167773).\n- ip6_gre: fix null-ptr-deref in ip6gre_init_net() (git-fixes).\n- ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() (networking-stable-20_06_28).\n- ip_tunnel: fix use-after-free in ip_tunnel_lookup() (networking-stable-20_06_28).\n- ipv4: fill fl4_icmp_{type,code} in ping_v4_sendmsg (networking-stable-20_07_17).\n- ipv6: fib6_select_path can not use out path for nexthop objects (networking-stable-20_07_17).\n- ipv6: Fix use of anycast address with loopback (networking-stable-20_07_17).\n- ipvs: fix the connection sync failed in some cases (bsc#1174699).\n- irqchip/gic: Atomically update affinity (bsc#1175195).\n- iwlegacy: Check the return value of pcie_capability_read_*() (git-fixes).\n- jbd2: add the missing unlock_buffer() in the error path of jbd2_write_superblock() (bsc#1175772).\n- kABI workaround for enum cpuhp_state (git-fixes).\n- kABI workaround for struct kvm_device (git-fixes). Just change an variable to \u0027const\u0027 type in kvm_device.\n- kABI workaround for struct kvm_vcpu_arch (git-fixes). Add a struct variable to the end of kvm_vcpu_arch and kvm_vcpu_arch is embedded into kvm_vcpu at the end. It is usually used by pointer and allocated dynamically, so this change should be fine even for external kvm module.\n- kABI/severities: ignore KABI for NVMe, except nvme-fc (bsc#1174777) Exported symbols under drivers/nvme/host/ are only used by the nvme subsystem itself, except for the nvme-fc symbols.\n- kABI/severities: ignore qla2xxx as all symbols are internal\n- kABI: genetlink: remove genl_bind (kabi).\n- kABI: restore signature of xfrm_policy_bysel_ctx() and xfrm_policy_byid() (bsc#1174645).\n- kernel.h: remove duplicate include of asm/div64.h (git-fixes).\n- kernel/relay.c: fix memleak on destroy relay channel (git-fixes).\n- kernfs: do not call fsnotify() with name without a parent (bsc#1175770).\n- kobject: Avoid premature parent object freeing in kobject_cleanup() (git-fixes).\n- KVM: Allow kvm_device_ops to be const (bsc#1172197 jsc#SLE-13593).\n- KVM: arm/arm64: Correct AArch32 SPSR on exception entry (bsc#1133021).\n- KVM: arm/arm64: Correct CPSR on exception entry (bsc#1133021).\n- KVM: arm/arm64: Factor out hypercall handling from PSCI code (bsc#1172197 jsc#SLE-13593).\n- KVM: arm64: Annotate hyp NMI-related functions as __always_inline (bsc#1175190).\n- KVM: arm64: Correct PSTATE on exception entry (bsc#1133021).\n- KVM: arm64: Document PV-time interface (bsc#1172197 jsc#SLE-13593).\n- KVM: arm64: Fix 32bit PC wrap-around (bsc#1133021).\n- KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197 jsc#SLE-13593).\n- KVM: arm64: Make vcpu_cp1x() work on Big Endian hosts (bsc#1133021).\n- KVM: arm64: Provide VCPU attributes for stolen time (bsc#1172197 jsc#SLE-13593).\n- KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than SCHEDSTATS (bsc#1172197 jsc#SLE-13593).\n- KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART (bsc#1133021).\n- KVM: arm64: Stop writing aarch32\u0027s CSSELR into ACTLR (bsc#1133021).\n- KVM: arm64: Support stolen time reporting via shared structure (bsc#1172197 jsc#SLE-13593).\n- KVM: arm64: Use the correct timer structure to access the physical counter (bsc#1133021).\n- KVM: arm: vgic: Fix limit condition when writing to GICD_IACTIVER (bsc#1133021).\n- KVM: Implement kvm_put_guest() (bsc#1172197 jsc#SLE-13593).\n- KVM: Play nice with read-only memslots when querying host page size (bsc#1133021).\n- KVM: PPC: Book3S PR: Remove uninitialized_var() usage (bsc#1065729).\n- KVM: Reinstall old memslots if arch preparation fails (bsc#1133021).\n- KVM: s390: Remove false WARN_ON_ONCE for the PQAP instruction (bsc#1133021).\n- KVM: x86: Fix APIC page invalidation race (bsc#1133021).\n- l2tp: remove skb_dst_set() from l2tp_xmit_skb() (networking-stable-20_07_17).\n- leds: 88pm860x: fix use-after-free on unbind (git-fixes).\n- leds: core: Flush scheduled work for system suspend (git-fixes).\n- leds: da903x: fix use-after-free on unbind (git-fixes).\n- leds: gpio: Fix semantic error (git-fixes).\n- leds: lm3533: fix use-after-free on unbind (git-fixes).\n- leds: lm355x: avoid enum conversion warning (git-fixes).\n- leds: lm36274: fix use-after-free on unbind (git-fixes).\n- leds: wm831x-status: fix use-after-free on unbind (git-fixes).\n- libbpf: Wrap source argument of BPF_CORE_READ macro in parentheses (bsc#1155518).\n- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).\n- llc: make sure applications use ARPHRD_ETHER (networking-stable-20_07_17).\n- locktorture: Print ratio of acquisitions, not failures (bsc#1149032).\n- mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).\n- mac80211: fix misplaced while instead of if (git-fixes).\n- mac80211: mesh: Free ie data when leaving mesh (git-fixes).\n- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).\n- Mark the SLE15-SP2 kernel properly released. There perhaps was a typo, when SUSE_KERNEL_RELEASED missed the trailing \u0027D\u0027 - this leads to our kernels being marked as \u0027Unreleased kernel\u0027. SUSE_KERNEL_RELEASED is defined in rpm/kernel-binary.spec.in. To fix that, it should be enough to switch from SUSE_KERNEL_RELEASE to SUSE_KERNEL_RELEASED.\n- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (git-fixes).\n- md/raid5: Fix Force reconstruct-write io stuck in degraded raid5 (git-fixes).\n- media: budget-core: Improve exception handling in budget_register() (git-fixes).\n- media: camss: fix memory leaks on error handling paths in probe (git-fixes).\n- media: cxusb-analog: fix V4L2 dependency (git-fixes).\n- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).\n- media: firewire: Using uninitialized values in node_probe() (git-fixes).\n- media: marvell-ccic: Add missed v4l2_async_notifier_cleanup() (git-fixes).\n- media: media-request: Fix crash if memory allocation fails (git-fixes).\n- media: nuvoton-cir: remove setting tx carrier functions (git-fixes).\n- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).\n- media: rockchip: rga: Introduce color fmt macros and refactor CSC mode logic (git-fixes).\n- media: rockchip: rga: Only set output CSC mode for RGB input (git-fixes).\n- media: sur40: Remove uninitialized_var() usage (git-fixes).\n- media: vpss: clean up resources in init (git-fixes).\n- media: vsp1: dl: Fix NULL pointer dereference on unbind (git-fixes).\n- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).\n- mfd: dln2: Run event handler loop under spinlock (git-fixes).\n- mfd: intel-lpss: Add Intel Tiger Lake PCH-H PCI IDs (jsc#SLE-13411).\n- mld: fix memory leak in ipv6_mc_destroy_dev() (networking-stable-20_06_28).\n- mlxsw: core: Fix wrong SFP EEPROM reading for upper pages 1-3 (bsc#1154488).\n- mlxsw: pci: Fix use-after-free in case of failed devlink reload (networking-stable-20_07_17).\n- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (networking-stable-20_07_17).\n- mm, vmstat: reduce zone-\u003elock holding time by /proc/pagetypeinfo (bsc#1175691).\n- mm/vunmap: add cond_resched() in vunmap_pmd_range (bsc#1175654 ltc#184617).\n- mm: filemap: clear idle flag for writes (bsc#1175769).\n- mm: Fix protection usage propagation (bsc#1174002).\n- mmc: sdhci-cadence: do not use hardware tuning for SD mode (git-fixes).\n- mmc: sdhci-pci-o2micro: Bug fix for O2 host controller Seabird1 (git-fixes).\n- mtd: properly check all write ioctls for permissions (git-fixes).\n- mtd: rawnand: fsl_upm: Remove unused mtd var (git-fixes).\n- mtd: rawnand: qcom: avoid write to unavailable register (git-fixes).\n- mvpp2: ethtool rxtx stats fix (networking-stable-20_06_28).\n- mwifiex: Fix firmware filename for sd8977 chipset (git-fixes).\n- mwifiex: Fix firmware filename for sd8997 chipset (git-fixes).\n- mwifiex: Prevent memory corruption handling keys (git-fixes).\n- ndctl/papr_scm,uapi: Add support for PAPR nvdimm specific methods (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n- net, sk_msg: Clear sk_user_data pointer on clone if tagged (bsc#1155518).\n- net, sk_msg: Do not use RCU_INIT_POINTER on sk_user_data (bsc#1155518).\n- net/bpfilter: Initialize pos in __bpfilter_process_sockopt (bsc#1155518).\n- net/bpfilter: split __bpfilter_process_sockopt (bsc#1155518).\n- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).\n- net/mlx5: DR, Change push vlan action sequence (jsc#SLE-8464).\n- net/mlx5: E-switch, Destroy TSAR when fail to enable the mode (jsc#SLE-8464).\n- net/mlx5: Fix eeprom support for SFP module (networking-stable-20_07_17).\n- net/mlx5e: Fix 50G per lane indication (networking-stable-20_07_17).\n- net/mlx5e: Fix kernel crash when setting vf VLANID on a VF dev (jsc#SLE-8464).\n- net: Added pointer check for dst-\u003eops-\u003eneigh_lookup in dst_neigh_lookup_skb (networking-stable-20_07_17).\n- net: bridge: enfore alignment for ethernet address (networking-stable-20_06_28).\n- net: core: reduce recursion limit value (networking-stable-20_06_28).\n- net: Do not clear the sock TX queue in sk_set_socket() (networking-stable-20_06_28).\n- net: dsa: microchip: set the correct number of ports (networking-stable-20_07_17).\n- net: ena: add reserved PCI device ID (bsc#1174852).\n- net: ena: add support for reporting of packet drops (bsc#1174852).\n- net: ena: add support for the rx offset feature (bsc#1174852).\n- net: ena: add support for traffic mirroring (bsc#1174852).\n- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).\n- net: ena: allow setting the hash function without changing the key (bsc#1174852).\n- net: ena: avoid memory access violation by validating req_id properly (bsc#1174852).\n- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).\n- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).\n- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).\n- net: ena: Change WARN_ON expression in ena_del_napi_in_range() (bsc#1154492).\n- net: ena: changes to RSS hash key allocation (bsc#1174852).\n- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).\n- net: ena: cosmetic: code reorderings (bsc#1174852).\n- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).\n- net: ena: cosmetic: fix line break issues (bsc#1174852).\n- net: ena: cosmetic: fix spacing issues (bsc#1174852).\n- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).\n- net: ena: cosmetic: minor code changes (bsc#1174852).\n- net: ena: cosmetic: remove unnecessary code (bsc#1174852).\n- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).\n- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).\n- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).\n- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).\n- net: ena: drop superfluous prototype (bsc#1174852).\n- net: ena: enable support of rss hash key and function changes (bsc#1174852).\n- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).\n- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).\n- net: ena: fix continuous keep-alive resets (bsc#1174852).\n- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).\n- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).\n- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).\n- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).\n- net: ena: Make missed_tx stat incremental (git-fixes).\n- net: ena: Make some functions static (bsc#1174852).\n- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).\n- net: ena: Prevent reset after device destruction (git-fixes).\n- net: ena: reduce driver load time (bsc#1174852).\n- net: ena: remove code that does nothing (bsc#1174852).\n- net: ena: remove set but not used variable \u0027hash_key\u0027 (bsc#1174852).\n- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).\n- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).\n- net: ena: support new LLQ acceleration mode (bsc#1174852).\n- net: ena: use explicit variable size for clarity (bsc#1174852).\n- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).\n- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)\n- net: fix memleak in register_netdevice() (networking-stable-20_06_28).\n- net: Fix the arp error in some cases (networking-stable-20_06_28).\n- net: hns3: fix error handling for desc filling (git-fixes).\n- net: hns3: fix for not calculating TX BD send size correctly (git-fixes).\n- net: hns3: fix return value error when query MAC link status fail (git-fixes).\n- net: increment xmit_recursion level in dev_direct_xmit() (networking-stable-20_06_28).\n- net: lan78xx: add missing endpoint sanity check (git-fixes).\n- net: lan78xx: fix transfer-buffer memory leak (git-fixes).\n- net: lan78xx: replace bogus endpoint lookup (git-fixes).\n- net: mvneta: fix use of state-\u003espeed (networking-stable-20_07_17).\n- net: phy: Check harder for errors in get_phy_id() (git-fixes).\n- net: phy: fix memory leak in device-create error path (git-fixes).\n- net: qrtr: Fix an out of bounds read qrtr_endpoint_post() (networking-stable-20_07_17).\n- net: usb: ax88179_178a: fix packet alignment padding (networking-stable-20_06_28).\n- net: usb: qmi_wwan: add support for Quectel EG95 LTE modem (networking-stable-20_07_17).\n- net_sched: fix a memory leak in atm_tc_init() (networking-stable-20_07_17).\n- netdevsim: fix unbalaced locking in nsim_create() (git-fixes).\n- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).\n- nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).\n- ntb: Fix static check warning in perf_clear_test (git-fixes).\n- ntb: Fix the default port and peer numbers for legacy drivers (git-fixes).\n- ntb: hw: remove the code that sets the DMA mask (git-fixes).\n- ntb: ntb_pingpong: Choose doorbells based on port number (git-fixes).\n- ntb: ntb_test: Fix bug when counting remote files (git-fixes).\n- ntb: ntb_tool: reading the link file should not end in a NULL byte (git-fixes).\n- ntb: perf: Do not require one more memory window than number of peers (git-fixes).\n- ntb: perf: Fix race condition when run with ntb_test (git-fixes).\n- ntb: perf: Fix support for hardware that does not have port numbers (git-fixes).\n- ntb: Revert the change to use the NTB device dev for DMA allocations (git-fixes).\n- ntb_perf: pass correct struct device to dma_alloc_coherent (git-fixes).\n- ntb_tool: pass correct struct device to dma_alloc_coherent (git-fixes).\n- nvme-multipath: do not fall back to __nvme_find_path() for non-optimized paths (bsc#1172108).\n- nvme-multipath: fix logic for non-optimized paths (bsc#1172108).\n- nvme-multipath: round-robin: eliminate \u0027fallback\u0027 variable (bsc#1172108).\n- nvme-multipath: set bdi capabilities once (bsc#1159058).\n- nvme-pci: Re-order nvme_pci_free_ctrl (bsc#1159058).\n- nvme-rdma: Add warning on state change failure at (bsc#1159058).\n- nvme-tcp: Add warning on state change failure at (bsc#1159058).\n- nvme-tcp: fix possible crash in write_zeroes processing (bsc#1159058).\n- nvme: add a Identify Namespace Identification Descriptor list quirk (git-fixes).\n- nvme: always search for namespace head (bsc#1159058).\n- nvme: avoid an Identify Controller command for each namespace (bsc#1159058).\n- nvme: check namespace head shared property (bsc#1159058).\n- nvme: clean up nvme_scan_work (bsc#1159058).\n- nvme: cleanup namespace identifier reporting in (bsc#1159058).\n- nvme: consolidate chunk_sectors settings (bsc#1159058).\n- nvme: consolodate io settings (bsc#1159058).\n- nvme: expose hostid via sysfs for fabrics controllers (bsc#1159058).\n- nvme: expose hostnqn via sysfs for fabrics controllers (bsc#1159058).\n- nvme: factor out a nvme_ns_remove_by_nsid helper (bsc#1159058).\n- nvme: fix a crash in nvme_mpath_add_disk (git-fixes, bsc#1159058).\n- nvme: Fix controller creation races with teardown flow (bsc#1159058).\n- nvme: Fix ctrl use-after-free during sysfs deletion (bsc#1159058).\n- nvme: fix identify error status silent ignore (git-fixes, bsc#1159058).\n- nvme: fix possible hang when ns scanning fails during error (bsc#1159058).\n- nvme: kABI fixes for nvme_ctrl (bsc#1159058).\n- nvme: Make nvme_uninit_ctrl symmetric to nvme_init_ctrl (bsc#1159058).\n- nvme: multipath: round-robin: fix single non-optimized path case (bsc#1172108).\n- nvme: prevent double free in nvme_alloc_ns() error handling (bsc#1159058).\n- nvme: provide num dword helper (bsc#1159058).\n- nvme: refactor nvme_identify_ns_descs error handling (bsc#1159058).\n- nvme: refine the Qemu Identify CNS quirk (bsc#1159058).\n- nvme: release ida resources (bsc#1159058).\n- nvme: release namespace head reference on error (bsc#1159058).\n- nvme: remove the magic 1024 constant in nvme_scan_ns_list (bsc#1159058).\n- nvme: remove unused parameter (bsc#1159058).\n- nvme: Remove unused return code from nvme_delete_ctrl_sync (bsc#1159058).\n- nvme: rename __nvme_find_ns_head to nvme_find_ns_head (bsc#1159058).\n- nvme: revalidate after verifying identifiers (bsc#1159058).\n- nvme: revalidate namespace stream parameters (bsc#1159058).\n- nvme: unlink head after removing last namespace (bsc#1159058).\n- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n- ocfs2: fix remounting needed after setfacl command (bsc#1173954).\n- ocfs2: load global_inode_alloc (bsc#1172963).\n- omapfb: dss: Fix max fclk divider for omap36xx (git-fixes).\n- openvswitch: take into account de-fragmentation/gso_size in execute_check_pkt_len (networking-stable-20_06_28).\n- PCI/ASPM: Add missing newline in sysfs \u0027policy\u0027 (git-fixes).\n- PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes).\n- PCI: cadence: Fix updating Vendor ID and Subsystem Vendor ID register (git-fixes).\n- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).\n- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).\n- PCI: hv: Fix a timing issue which causes kdump to fail occasionally (bsc#1172871, git-fixes).\n- PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).\n- PCI: qcom: Add missing reset for ipq806x (git-fixes).\n- PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).\n- PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).\n- PCI: rcar: Fix runtime PM imbalance on error (git-fixes).\n- PCI: Release IVRS table in AMD ACS quirk (git-fixes).\n- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).\n- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).\n- PCI: tegra: Revert tegra124 raw_violation_fixup (git-fixes).\n- phy: armada-38x: fix NETA lockup when repeatedly switching speeds (git-fixes).\n- phy: exynos5-usbdrd: Calibrating makes sense only for USB2.0 PHY (git-fixes).\n- phy: renesas: rcar-gen3-usb2: move irq registration to init (git-fixes).\n- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).\n- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).\n- pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).\n- pinctrl: ingenic: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).\n- pinctrl: single: fix function name in documentation (git-fixes).\n- platform/chrome: cros_ec_ishtp: Fix a double-unlock issue (git-fixes).\n- platform/x86: asus-nb-wmi: add support for ASUS ROG Zephyrus G14 and G15 (git-fixes).\n- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).\n- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).\n- platform/x86: ISST: Add new PCI device ids (git-fixes).\n- PM: wakeup: Show statistics for deleted wakeup sources again (git-fixes).\n- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).\n- powerpc/64s: Do not init FSCR_DSCR in __init_FSCR() (bsc#1065729).\n- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).\n- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).\n- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).\n- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).\n- powerpc/fadump: Fix build error with CONFIG_PRESERVE_FA_DUMP=y (bsc#1156395).\n- powerpc/iommu: Allow bypass-only for DMA (bsc#1156395).\n- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).\n- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).\n- powerpc/papr_scm: Add support for fetching nvdimm \u0027fuel-gauge\u0027 metric (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n- powerpc/papr_scm: Fetch nvdimm health information from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n- powerpc/papr_scm: Fetch nvdimm performance stats from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n- powerpc/papr_scm: Implement support for PAPR_PDSM_HEALTH (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n- powerpc/papr_scm: Improve error logging and handling papr_scm_ndctl() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n- powerpc/papr_scm: Mark papr_scm_ndctl() as static (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n- powerpc/perf: Fix missing is_sier_aviable() during build (bsc#1065729).\n- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).\n- powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU death (bsc#1085030 ltC#165630).\n- powerpc/pseries: Do not initiate shutdown when system is running on UPS (bsc#1175440 ltc#187574).\n- powerpc/pseries: PCIE PHB reset (bsc#1174689).\n- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).\n- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).\n- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).\n- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).\n- powerpc: Document details on H_SCM_HEALTH hcall (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n- pseries: Fix 64 bit logical memory block panic (bsc#1065729).\n- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).\n- qed: suppress \u0027do not support RoCE \u0026 iWARP\u0027 flooding on HW init (git-fixes).\n- qed: suppress false-positives interrupt error messages on HW init (git-fixes).\n- r8169: fix jumbo configuration for RTL8168evl (bsc#1175296).\n- r8169: fix jumbo packet handling on resume from suspend (bsc#1175296).\n- r8169: fix resume on cable plug-in (bsc#1175296).\n- r8169: fix rtl_hw_jumbo_disable for RTL8168evl (bsc#1175296).\n- r8169: move disabling interrupt coalescing to RTL8169/RTL8168 init (bsc#1175296).\n- r8169: read common register for PCI commit (bsc#1175296).\n- random32: move the pseudo-random 32-bit definitions to prandom.h (git-fixes).\n- random32: remove net_rand_state from the latent entropy gcc plugin (git-fixes).\n- random: fix circular include dependency on arm64 after addition of percpu.h (git-fixes).\n- RDMA/cm: Add missing locking around id.state in cm_dup_req_handler (git-fixes).\n- RDMA/cm: Fix an error check in cm_alloc_id_priv() (git-fixes).\n- RDMA/cm: Fix checking for allowed duplicate listens (git-fixes).\n- RDMA/cm: Fix ordering of xa_alloc_cyclic() in ib_create_cm_id() (git-fixes).\n- RDMA/cm: Read id.state under lock when doing pr_debug() (git-fixes).\n- RDMA/cm: Remove a race freeing timewait_info (git-fixes).\n- RDMA/cm: Update num_paths in cma_resolve_iboe_route error flow (git-fixes).\n- RDMA/cma: Protect bind_list and listen_list while finding matching cm id (git-fixes).\n- RDMA/core: Fix double destruction of uobject (git-fixes).\n- RDMA/core: Fix double put of resource (git-fixes).\n- RDMA/core: Fix missing error check on dev_set_name() (git-fixes).\n- RDMA/core: Fix protection fault in ib_mr_pool_destroy (git-fixes).\n- RDMA/core: Fix race between destroy and release FD object (git-fixes).\n- RDMA/core: Fix race in rdma_alloc_commit_uobject() (git-fixes).\n- RDMA/core: Prevent mixed use of FDs between shared ufiles (git-fixes).\n- RDMA/counter: Query a counter before release (git-fixes).\n- RDMA/efa: Set maximum pkeys device attribute (git-fixes).\n- RDMA/hns: Bugfix for querying qkey (git-fixes).\n- RDMA/hns: Fix cmdq parameter of querying pf timer resource (git-fixes).\n- RDMA/iw_cxgb4: Fix incorrect function parameters (git-fixes).\n- RDMA/iwcm: Fix iwcm work deallocation (git-fixes).\n- RDMA/mad: Do not crash if the rdma device does not have a umad interface (git-fixes).\n- RDMA/mad: Fix possible memory leak in ib_mad_post_receive_mads() (git-fixes).\n- RDMA/mlx4: Initialize ib_spec on the stack (git-fixes).\n- RDMA/mlx5: Add init2init as a modify command (git-fixes).\n- RDMA/mlx5: Add missing srcu_read_lock in ODP implicit flow (jsc#SLE-8446).\n- RDMA/mlx5: Fix access to wrong pointer while performing flush due to error (git-fixes).\n- RDMA/mlx5: Fix prefetch memory leak if get_prefetchable_mr fails (jsc#SLE-8446).\n- RDMA/mlx5: Fix the number of hwcounters of a dynamic counter (git-fixes).\n- RDMA/mlx5: Fix typo in enum name (git-fixes).\n- RDMA/mlx5: Fix udata response upon SRQ creation (git-fixes).\n- RDMA/mlx5: Prevent prefetch from racing with implicit destruction (jsc#SLE-8446).\n- RDMA/mlx5: Set GRH fields in query QP on RoCE (git-fixes).\n- RDMA/mlx5: Use xa_lock_irq when access to SRQ table (git-fixes).\n- RDMA/mlx5: Verify that QP is created with RQ or SQ (git-fixes).\n- RDMA/nldev: Fix crash when set a QP to a new counter but QPN is missing (git-fixes).\n- RDMA/pvrdma: Fix missing pci disable in pvrdma_pci_probe() (git-fixes).\n- RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (git-fixes).\n- RDMA/rvt: Fix potential memory leak caused by rvt_alloc_rq (git-fixes).\n- RDMA/rxe: Always return ERR_PTR from rxe_create_mmap_info() (git-fixes).\n- RDMA/rxe: Fix configuration of atomic queue pair attributes (git-fixes).\n- RDMA/rxe: Set default vendor ID (git-fixes).\n- RDMA/rxe: Set sys_image_guid to be aligned with HW IB devices (git-fixes).\n- RDMA/siw: Fix failure handling during device creation (git-fixes).\n- RDMA/siw: Fix passive connection establishment (git-fixes).\n- RDMA/siw: Fix pointer-to-int-cast warning in siw_rx_pbl() (git-fixes).\n- RDMA/siw: Fix potential siw_mem refcnt leak in siw_fastreg_mr() (git-fixes).\n- RDMA/siw: Fix reporting vendor_part_id (git-fixes).\n- RDMA/siw: Fix setting active_mtu attribute (git-fixes).\n- RDMA/siw: Fix setting active_{speed, width} attributes (git-fixes).\n- RDMA/ucma: Put a lock around every call to the rdma_cm layer (git-fixes).\n- RDMA/uverbs: Fix create WQ to use the given user handle (git-fixes).\n- regmap: debugfs: check count when read regmap file (git-fixes).\n- regmap: dev_get_regmap_match(): fix string comparison (git-fixes).\n- regulator: gpio: Honor regulator-boot-on property (git-fixes).\n- remoteproc: qcom: q6v5: Update running state before requesting stop (git-fixes).\n- remoteproc: qcom_q6v5_mss: Validate MBA firmware size before load (git-fixes).\n- remoteproc: qcom_q6v5_mss: Validate modem blob firmware size before load (git-fixes).\n- Revert \u0027ALSA: hda: call runtime_allow() for all hda controllers\u0027 (git-fixes).\n- Revert \u0027drm/amd/display: Expose connector VRR range via debugfs\u0027 (bsc#1152489) \t* refreshed for context changes\n- Revert \u0027drm/amdgpu: Fix NULL dereference in dpm sysfs handlers\u0027 (git-fixes).\n- Revert \u0027i2c: cadence: Fix the hold bit setting\u0027 (git-fixes).\n- Revert \u0027RDMA/cma: Simplify rdma_resolve_addr() error flow\u0027 (git-fixes).\n- Revert \u0027scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe\u0027 (bsc#1171688 bsc#1174003).\n- Revert \u0027scsi: qla2xxx: Fix crash on qla2x00_mailbox_command\u0027 (bsc#1171688 bsc#1174003).\n- rhashtable: Document the right function parameters (bsc#1174880).\n- rhashtable: drop duplicated word in \u003clinux/rhashtable.h\u003e (bsc#1174880).\n- rhashtable: Drop raw RCU deref in nested_table_free (bsc#1174880).\n- rhashtable: Fix unprotected RCU dereference in __rht_ptr (bsc#1174880).\n- rhashtable: Restore RCU marking on rhash_lock_head (bsc#1174880).\n- RMDA/cm: Fix missing ib_cm_destroy_id() in ib_cm_insert_listen() (git-fixes).\n- rocker: fix incorrect error handling in dma_rings_init (networking-stable-20_06_28).\n- rpm/modules.fips: * add ecdh_generic (boo#1173813)\n- rtc: goldfish: Enable interrupt in set_alarm() when necessary (git-fixes).\n- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).\n- rtnetlink: Fix memory(net_device) leak when -\u003enewlink fails (bsc#1154353).\n- rtnetlink: Fix memory(net_device) leak when -\u003enewlink fails (git-fixes).\n- rtw88: fix LDPC field for RA info (git-fixes).\n- rtw88: fix short GI capability based on current bandwidth (git-fixes).\n- sch_cake: do not call diffserv parsing code when it is not needed (networking-stable-20_06_28).\n- sch_cake: do not try to reallocate or unshare skb unconditionally (networking-stable-20_06_28).\n- sched: consistently handle layer3 header accesses in the presence of VLANs (networking-stable-20_07_17).\n- scsi/fc: kABI fixes for new ELS_RPD definition (bsc#1171688 bsc#1174003).\n- scsi: dh: Add Fujitsu device to devinfo and dh lists (bsc#1174026).\n- scsi: Fix trivial spelling (bsc#1171688 bsc#1174003).\n- scsi: ipr: Fix softlockup when rescanning devices in petitboot (jsc#SLE-13654).\n- scsi: ipr: remove unneeded semicolon (jsc#SLE-13654).\n- scsi: ipr: Use scnprintf() for avoiding potential buffer overflow (jsc#SLE-13654).\n- scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Address a set of sparse warnings (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Change {RD,WRT}_REG_*() function names from upper case into lower case (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix endianness annotations in header files (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix endianness annotations in source files (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix issue with adapter\u0027s stopping state (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix login timeout (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix null pointer access during disconnect from subsystem (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix spelling of a variable name (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix warning after FC target reset (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Flush all sessions on zone disable (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Flush I/O on zone disable (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Initialize \u0027n\u0027 before using it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Reduce noisy debug message (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove a superfluous cast (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove an unused function (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: SAN congestion management implementation (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use register names instead of register offsets (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use true, false for ha-\u003efw_dumped (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1171688 bsc#1174003).\n- scsi: smartpqi: add id support for SmartRAID 3152-8i (bsc#1172418).\n- scsi: smartpqi: add RAID bypass counter (bsc#1172418).\n- scsi: smartpqi: avoid crashing kernel for controller issues (bsc#1172418).\n- scsi: smartpqi: bump version to 1.2.16-010 (bsc#1172418).\n- scsi: smartpqi: Identify physical devices without issuing INQUIRY (bsc#1172418).\n- scsi: smartpqi: support device deletion via sysfs (bsc#1172418).\n- scsi: smartpqi: update logical volume size after expansion (bsc#1172418).\n- scsi: smartpqi: Use scnprintf() for avoiding potential buffer overflow (bsc#1172418).\n- scsi: target/iblock: fix WRITE SAME zeroing (bsc#1169790).\n- sctp: Do not advertise IPv4 addresses if ipv6only is set on the socket (networking-stable-20_06_28).\n- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).\n- seq_buf: Export seq_buf_printf (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n- serial: 8250: change lock order in serial8250_do_startup() (git-fixes).\n- serial: 8250: fix null-ptr-deref in serial8250_start_tx() (git-fixes).\n- serial: 8250_mtk: Fix high-speed baud rates clamping (git-fixes).\n- serial: 8250_pci: Move Pericom IDs to pci_ids.h (git-fixes).\n- serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes).\n- serial: exar: Fix GPIO configuration for Sealevel cards based on XR17V35X (git-fixes).\n- serial: mxs-auart: add missed iounmap() in probe failure and remove (git-fixes).\n- serial: pl011: Do not leak amba_ports entry on driver register error (git-fixes).\n- serial: pl011: Fix oops on -EPROBE_DEFER (git-fixes).\n- serial: tegra: fix CREAD handling for PIO (git-fixes).\n- soc/tegra: pmc: Enable PMIC wake event on Tegra194 (bsc#1175834).\n- soc/tegra: pmc: Enable PMIC wake event on Tegra210 (bsc#1175116).\n- soc: qcom: rpmh-rsc: Set suppress_bind_attrs flag (git-fixes).\n- spi: davinci: Remove uninitialized_var() usage (git-fixes).\n- spi: lantiq-ssc: Fix warning by using WQ_MEM_RECLAIM (git-fixes).\n- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).\n- spi: mediatek: use correct SPI_CFG2_REG MACRO (git-fixes).\n- spi: pxa2xx: Add support for Intel Tiger Lake PCH-H (jsc#SLE-13411).\n- spi: rockchip: Fix error in SPI slave pio read (git-fixes).\n- spi: spi-geni-qcom: Actually use our FIFO (git-fixes).\n- spi: spidev: Align buffers for DMA (git-fixes).\n- spi: stm32: fixes suspend/resume management (git-fixes).\n- spi: sun4i: update max transfer size reported (git-fixes).\n- staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).\n- Staging: rtl8188eu: rtw_mlme: Fix uninitialized variable authmode (git-fixes).\n- staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).\n- staging: rtl8712: handle firmware load failure (git-fixes).\n- staging: vchiq_arm: Add a matching unregister call (git-fixes).\n- staging: wlan-ng: properly check endpoint types (git-fixes).\n- tcp: do not ignore ECN CWR on pure ACK (networking-stable-20_06_28).\n- tcp: fix SO_RCVLOWAT possible hangs under high mem pressure (networking-stable-20_07_17).\n- tcp: grow window for OOO packets only for SACK flows (networking-stable-20_06_28).\n- tcp: make sure listeners do not initialize congestion-control state (networking-stable-20_07_17).\n- tcp: md5: add missing memory barriers in tcp_md5_do_add()/tcp_md5_hash_key() (networking-stable-20_07_17).\n- tcp: md5: do not send silly options in SYNCOOKIES (networking-stable-20_07_17).\n- tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key() barriers (networking-stable-20_07_17).\n- tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT (networking-stable-20_06_28).\n- thermal: ti-soc-thermal: Fix reversed condition in ti_thermal_expose_sensor() (git-fixes).\n- tpm: Require that all digests are present in TCG_PCR_EVENT2 structures (git-fixes).\n- tpm_crb: fix fTPM on AMD Zen+ CPUs (bsc#1174362).\n- tracepoint: Mark __tracepoint_string\u0027s __used (git-fixes).\n- tracing: Use trace_sched_process_free() instead of exit() for pid tracing (git-fixes).\n- ubsan: check panic_on_warn (bsc#1174805).\n- uio_pdrv_genirq: Remove warning when irq is not specified (bsc#1174762).\n- update upstream reference\n- usb: bdc: Halt controller on suspend (git-fixes).\n- usb: core: fix quirks_param_set() writing to a const pointer (git-fixes).\n- usb: dwc2: gadget: Make use of GINTMSK2 (git-fixes).\n- usb: dwc3: pci: add support for the Intel Jasper Lake (git-fixes).\n- usb: dwc3: pci: add support for the Intel Tiger Lake PCH -H variant (git-fixes).\n- usb: gadget: f_uac2: fix AC Interface Header Descriptor wTotalLength (git-fixes).\n- usb: gadget: net2280: fix memory leak on probe error handling paths (git-fixes).\n- usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes).\n- usb: hso: check for return value in hso_serial_common_create() (git-fixes).\n- usb: hso: Fix debug compile warning on sparc32 (git-fixes).\n- usb: iowarrior: fix up report size handling for some devices (git-fixes).\n- usb: mtu3: clear dual mode of u3port when disable device (git-fixes).\n- usb: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).\n- usb: serial: cp210x: re-enable auto-RTS on open (git-fixes).\n- usb: serial: iuu_phoenix: fix led-activity helpers (git-fixes).\n- usb: serial: qcserial: add EM7305 QDL product ID (git-fixes).\n- usb: tegra: Fix allocation for the FPCI context (git-fixes).\n- usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).\n- usb: xhci: define IDs for various ASMedia host controllers (git-fixes).\n- usb: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).\n- usb: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).\n- usbip: tools: fix module name in man page (git-fixes).\n- video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes).\n- video: fbdev: savage: fix memory leak on error handling path in probe (git-fixes).\n- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).\n- video: pxafb: Fix the function used to balance a \u0027dma_alloc_coherent()\u0027 call (git-fixes).\n- vlan: consolidate VLAN parsing code and limit max parsing depth (networking-stable-20_07_17).\n- vmxnet3: use correct tcp hdr length when packet is encapsulated (bsc#1175199).\n- vt: Reject zero-sized screen buffer size (git-fixes).\n- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (git-fixes).\n- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (git-fixes).\n- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (git-fixes).\n- watchdog: initialize device before misc_register (git-fixes).\n- wireless: Use linux/stddef.h instead of stddef.h (git-fixes).\n- wireless: Use offsetof instead of custom macro (git-fixes).\n- wl1251: fix always return 0 error (git-fixes).\n- x86/bugs/multihit: Fix mitigation reporting when VMX is not in use (git-fixes).\n- xen/pvcalls-back: test for errors when calling backend_connect() (bsc#1065600).\n- xfrm: fix a warning in xfrm_policy_insert_list (bsc#1174645).\n- xfrm: policy: match with both mark and mask on user interfaces (bsc#1174645).\n- xfs: do not eat an EIO/ENOSPC writeback error when scrubbing data fork (git-fixes).\n- xfs: fix inode allocation block res calculation precedence (git-fixes).\n- xfs: fix reflink quota reservation accounting error (git-fixes).\n- xfs: preserve rmapbt swapext block reservation from freed blocks (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2486,SUSE-SLE-Module-Basesystem-15-SP2-2020-2486,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2486,SUSE-SLE-Module-Legacy-15-SP2-2020-2486,SUSE-SLE-Module-Live-Patching-15-SP2-2020-2486,SUSE-SLE-Product-HA-15-SP2-2020-2486,SUSE-SLE-Product-WE-15-SP2-2020-2486", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2486-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2486-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202486-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2486-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007350.html" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1120163", "url": "https://bugzilla.suse.com/1120163" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1149032", "url": "https://bugzilla.suse.com/1149032" }, { "category": "self", "summary": "SUSE Bug 1152472", "url": "https://bugzilla.suse.com/1152472" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1153274", "url": "https://bugzilla.suse.com/1153274" }, { "category": "self", "summary": "SUSE Bug 1154353", "url": "https://bugzilla.suse.com/1154353" }, { "category": "self", "summary": "SUSE Bug 1154488", "url": "https://bugzilla.suse.com/1154488" }, { "category": "self", "summary": "SUSE Bug 1154492", "url": "https://bugzilla.suse.com/1154492" }, { "category": "self", "summary": "SUSE Bug 1155518", "url": "https://bugzilla.suse.com/1155518" }, { "category": "self", "summary": "SUSE Bug 1156395", "url": "https://bugzilla.suse.com/1156395" }, { "category": "self", "summary": "SUSE Bug 1159058", "url": "https://bugzilla.suse.com/1159058" }, { "category": "self", "summary": "SUSE Bug 1160634", "url": "https://bugzilla.suse.com/1160634" }, { "category": "self", "summary": "SUSE Bug 1167773", "url": "https://bugzilla.suse.com/1167773" }, { "category": "self", "summary": "SUSE Bug 1169790", "url": "https://bugzilla.suse.com/1169790" }, { "category": "self", "summary": "SUSE Bug 1171634", "url": "https://bugzilla.suse.com/1171634" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1172108", "url": "https://bugzilla.suse.com/1172108" }, { "category": "self", "summary": "SUSE Bug 1172197", "url": "https://bugzilla.suse.com/1172197" }, { "category": "self", "summary": "SUSE Bug 1172247", "url": "https://bugzilla.suse.com/1172247" }, { "category": "self", "summary": "SUSE Bug 1172418", "url": "https://bugzilla.suse.com/1172418" }, { "category": "self", "summary": "SUSE Bug 1172871", "url": "https://bugzilla.suse.com/1172871" }, { "category": "self", "summary": "SUSE Bug 1172963", "url": "https://bugzilla.suse.com/1172963" }, { "category": "self", "summary": "SUSE Bug 1173468", "url": "https://bugzilla.suse.com/1173468" }, { "category": "self", "summary": "SUSE Bug 1173485", "url": "https://bugzilla.suse.com/1173485" }, { "category": "self", "summary": "SUSE Bug 1173798", "url": "https://bugzilla.suse.com/1173798" }, { "category": "self", "summary": "SUSE Bug 1173813", "url": "https://bugzilla.suse.com/1173813" }, { "category": "self", "summary": "SUSE Bug 1173954", "url": "https://bugzilla.suse.com/1173954" }, { "category": "self", "summary": "SUSE Bug 1174002", "url": "https://bugzilla.suse.com/1174002" }, { "category": "self", "summary": "SUSE Bug 1174003", "url": "https://bugzilla.suse.com/1174003" }, { "category": "self", "summary": "SUSE Bug 1174026", "url": "https://bugzilla.suse.com/1174026" }, { "category": "self", "summary": "SUSE Bug 1174205", "url": "https://bugzilla.suse.com/1174205" }, { "category": "self", "summary": "SUSE Bug 1174247", "url": "https://bugzilla.suse.com/1174247" }, { "category": "self", "summary": "SUSE Bug 1174362", "url": "https://bugzilla.suse.com/1174362" }, { "category": "self", "summary": "SUSE Bug 1174387", "url": "https://bugzilla.suse.com/1174387" }, { "category": "self", "summary": "SUSE Bug 1174484", "url": "https://bugzilla.suse.com/1174484" }, { "category": "self", "summary": "SUSE Bug 1174625", "url": "https://bugzilla.suse.com/1174625" }, { "category": "self", "summary": "SUSE Bug 1174645", "url": "https://bugzilla.suse.com/1174645" }, { "category": "self", "summary": "SUSE Bug 1174689", "url": "https://bugzilla.suse.com/1174689" }, { "category": "self", "summary": "SUSE Bug 1174699", "url": "https://bugzilla.suse.com/1174699" }, { "category": "self", "summary": "SUSE Bug 1174737", "url": "https://bugzilla.suse.com/1174737" }, { "category": "self", "summary": "SUSE Bug 1174757", "url": "https://bugzilla.suse.com/1174757" }, { "category": "self", "summary": "SUSE Bug 1174762", "url": "https://bugzilla.suse.com/1174762" }, { "category": "self", "summary": "SUSE Bug 1174770", "url": "https://bugzilla.suse.com/1174770" }, { "category": "self", "summary": "SUSE Bug 1174771", "url": "https://bugzilla.suse.com/1174771" }, { "category": "self", "summary": "SUSE Bug 1174777", "url": "https://bugzilla.suse.com/1174777" }, { "category": "self", "summary": "SUSE Bug 1174805", "url": "https://bugzilla.suse.com/1174805" }, { "category": "self", "summary": "SUSE Bug 1174824", "url": "https://bugzilla.suse.com/1174824" }, { "category": "self", "summary": "SUSE Bug 1174825", "url": "https://bugzilla.suse.com/1174825" }, { "category": "self", "summary": "SUSE Bug 1174852", "url": "https://bugzilla.suse.com/1174852" }, { "category": "self", "summary": "SUSE Bug 1174865", "url": "https://bugzilla.suse.com/1174865" }, { "category": "self", "summary": "SUSE Bug 1174880", "url": "https://bugzilla.suse.com/1174880" }, { "category": "self", "summary": "SUSE Bug 1174897", "url": "https://bugzilla.suse.com/1174897" }, { "category": "self", "summary": "SUSE Bug 1174906", "url": "https://bugzilla.suse.com/1174906" }, { "category": "self", "summary": "SUSE Bug 1174969", "url": "https://bugzilla.suse.com/1174969" }, { "category": "self", "summary": "SUSE Bug 1175009", "url": "https://bugzilla.suse.com/1175009" }, { "category": "self", "summary": "SUSE Bug 1175010", "url": "https://bugzilla.suse.com/1175010" }, { "category": "self", "summary": "SUSE Bug 1175011", "url": "https://bugzilla.suse.com/1175011" }, { "category": "self", "summary": "SUSE Bug 1175012", "url": "https://bugzilla.suse.com/1175012" }, { "category": "self", "summary": "SUSE Bug 1175013", "url": "https://bugzilla.suse.com/1175013" }, { "category": "self", "summary": "SUSE Bug 1175014", "url": "https://bugzilla.suse.com/1175014" }, { "category": "self", "summary": "SUSE Bug 1175015", "url": "https://bugzilla.suse.com/1175015" }, { "category": "self", "summary": "SUSE Bug 1175016", "url": "https://bugzilla.suse.com/1175016" }, { "category": "self", "summary": "SUSE Bug 1175017", "url": "https://bugzilla.suse.com/1175017" }, { "category": "self", "summary": "SUSE Bug 1175018", "url": "https://bugzilla.suse.com/1175018" }, { "category": "self", "summary": "SUSE Bug 1175019", "url": "https://bugzilla.suse.com/1175019" }, { "category": "self", "summary": "SUSE Bug 1175020", "url": "https://bugzilla.suse.com/1175020" }, { "category": "self", "summary": "SUSE Bug 1175021", "url": "https://bugzilla.suse.com/1175021" }, { "category": "self", "summary": "SUSE Bug 1175052", "url": "https://bugzilla.suse.com/1175052" }, { "category": "self", "summary": "SUSE Bug 1175112", "url": "https://bugzilla.suse.com/1175112" }, { "category": "self", "summary": "SUSE Bug 1175116", "url": "https://bugzilla.suse.com/1175116" }, { "category": "self", "summary": "SUSE Bug 1175128", "url": "https://bugzilla.suse.com/1175128" }, { "category": "self", "summary": "SUSE Bug 1175149", "url": "https://bugzilla.suse.com/1175149" }, { "category": "self", "summary": "SUSE Bug 1175175", "url": "https://bugzilla.suse.com/1175175" }, { "category": "self", "summary": "SUSE Bug 1175176", "url": "https://bugzilla.suse.com/1175176" }, { "category": "self", "summary": "SUSE Bug 1175180", "url": "https://bugzilla.suse.com/1175180" }, { "category": "self", "summary": "SUSE Bug 1175181", "url": "https://bugzilla.suse.com/1175181" }, { "category": "self", "summary": "SUSE Bug 1175182", "url": "https://bugzilla.suse.com/1175182" }, { "category": "self", "summary": "SUSE Bug 1175183", "url": "https://bugzilla.suse.com/1175183" }, { "category": "self", "summary": "SUSE Bug 1175184", "url": "https://bugzilla.suse.com/1175184" }, { "category": "self", "summary": "SUSE Bug 1175185", "url": "https://bugzilla.suse.com/1175185" }, { "category": "self", "summary": "SUSE Bug 1175186", "url": "https://bugzilla.suse.com/1175186" }, { "category": "self", "summary": "SUSE Bug 1175187", "url": "https://bugzilla.suse.com/1175187" }, { "category": "self", "summary": "SUSE Bug 1175188", "url": "https://bugzilla.suse.com/1175188" }, { "category": "self", "summary": "SUSE Bug 1175189", "url": "https://bugzilla.suse.com/1175189" }, { "category": "self", "summary": "SUSE Bug 1175190", "url": "https://bugzilla.suse.com/1175190" }, { "category": "self", "summary": "SUSE Bug 1175191", "url": "https://bugzilla.suse.com/1175191" }, { "category": "self", "summary": "SUSE Bug 1175192", "url": "https://bugzilla.suse.com/1175192" }, { "category": "self", "summary": "SUSE Bug 1175195", "url": "https://bugzilla.suse.com/1175195" }, { "category": "self", "summary": "SUSE Bug 1175199", "url": "https://bugzilla.suse.com/1175199" }, { "category": "self", "summary": "SUSE Bug 1175213", "url": "https://bugzilla.suse.com/1175213" }, { "category": "self", "summary": "SUSE Bug 1175232", "url": "https://bugzilla.suse.com/1175232" }, { "category": "self", "summary": "SUSE Bug 1175263", "url": "https://bugzilla.suse.com/1175263" }, { "category": "self", "summary": "SUSE Bug 1175284", "url": "https://bugzilla.suse.com/1175284" }, { "category": "self", "summary": "SUSE Bug 1175296", "url": "https://bugzilla.suse.com/1175296" }, { "category": "self", "summary": "SUSE Bug 1175344", "url": "https://bugzilla.suse.com/1175344" }, { "category": "self", "summary": "SUSE Bug 1175345", "url": "https://bugzilla.suse.com/1175345" }, { "category": "self", "summary": "SUSE Bug 1175346", "url": "https://bugzilla.suse.com/1175346" }, { "category": "self", "summary": "SUSE Bug 1175347", "url": "https://bugzilla.suse.com/1175347" }, { "category": "self", "summary": "SUSE Bug 1175367", "url": "https://bugzilla.suse.com/1175367" }, { "category": "self", "summary": "SUSE Bug 1175377", "url": "https://bugzilla.suse.com/1175377" }, { "category": "self", "summary": "SUSE Bug 1175440", "url": "https://bugzilla.suse.com/1175440" }, { "category": "self", "summary": "SUSE Bug 1175493", "url": "https://bugzilla.suse.com/1175493" }, { "category": "self", "summary": "SUSE Bug 1175546", "url": "https://bugzilla.suse.com/1175546" }, { "category": "self", "summary": "SUSE Bug 1175550", "url": "https://bugzilla.suse.com/1175550" }, { "category": "self", "summary": "SUSE Bug 1175654", "url": "https://bugzilla.suse.com/1175654" }, { "category": "self", "summary": "SUSE Bug 1175691", "url": "https://bugzilla.suse.com/1175691" }, { "category": "self", "summary": "SUSE Bug 1175768", "url": "https://bugzilla.suse.com/1175768" }, { "category": "self", "summary": "SUSE Bug 1175769", "url": "https://bugzilla.suse.com/1175769" }, { "category": "self", "summary": "SUSE Bug 1175770", "url": "https://bugzilla.suse.com/1175770" }, { "category": "self", "summary": "SUSE Bug 1175771", "url": "https://bugzilla.suse.com/1175771" }, { "category": "self", "summary": "SUSE Bug 1175772", "url": "https://bugzilla.suse.com/1175772" }, { "category": "self", "summary": "SUSE Bug 1175774", "url": "https://bugzilla.suse.com/1175774" }, { "category": "self", "summary": "SUSE Bug 1175775", "url": "https://bugzilla.suse.com/1175775" }, { "category": "self", "summary": "SUSE Bug 1175834", "url": "https://bugzilla.suse.com/1175834" }, { "category": "self", "summary": "SUSE Bug 1175873", "url": "https://bugzilla.suse.com/1175873" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14314 page", "url": "https://www.suse.com/security/cve/CVE-2020-14314/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14356 page", "url": "https://www.suse.com/security/cve/CVE-2020-14356/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16166 page", "url": "https://www.suse.com/security/cve/CVE-2020-16166/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-09-03T18:16:04Z", "generator": { "date": "2020-09-03T18:16:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2486-1", "initial_release_date": "2020-09-03T18:16:04Z", "revision_history": [ { "date": "2020-09-03T18:16:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.12.1.aarch64", "product": { "name": "cluster-md-kmp-default-5.3.18-24.12.1.aarch64", "product_id": "cluster-md-kmp-default-5.3.18-24.12.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-24.12.1.aarch64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-24.12.1.aarch64", "product_id": "cluster-md-kmp-preempt-5.3.18-24.12.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.12.1.aarch64", "product": { "name": "dlm-kmp-default-5.3.18-24.12.1.aarch64", "product_id": "dlm-kmp-default-5.3.18-24.12.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-24.12.1.aarch64", "product": { "name": "dlm-kmp-preempt-5.3.18-24.12.1.aarch64", "product_id": "dlm-kmp-preempt-5.3.18-24.12.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.12.1.aarch64", "product": { "name": "gfs2-kmp-default-5.3.18-24.12.1.aarch64", "product_id": "gfs2-kmp-default-5.3.18-24.12.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-24.12.1.aarch64", "product": { "name": "gfs2-kmp-preempt-5.3.18-24.12.1.aarch64", "product_id": "gfs2-kmp-preempt-5.3.18-24.12.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.12.1.aarch64", "product": { "name": "kernel-default-5.3.18-24.12.1.aarch64", "product_id": "kernel-default-5.3.18-24.12.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.12.1.9.4.1.aarch64", "product": { "name": "kernel-default-base-5.3.18-24.12.1.9.4.1.aarch64", "product_id": "kernel-default-base-5.3.18-24.12.1.9.4.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.12.1.9.4.1.aarch64", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.12.1.9.4.1.aarch64", "product_id": "kernel-default-base-rebuild-5.3.18-24.12.1.9.4.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.12.1.aarch64", "product": { "name": "kernel-default-devel-5.3.18-24.12.1.aarch64", "product_id": "kernel-default-devel-5.3.18-24.12.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.12.1.aarch64", "product": { "name": "kernel-default-extra-5.3.18-24.12.1.aarch64", "product_id": "kernel-default-extra-5.3.18-24.12.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.12.1.aarch64", "product": { "name": "kernel-default-livepatch-5.3.18-24.12.1.aarch64", "product_id": "kernel-default-livepatch-5.3.18-24.12.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.12.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.12.1.aarch64", "product_id": "kernel-default-livepatch-devel-5.3.18-24.12.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.12.1.aarch64", "product": { "name": "kernel-obs-build-5.3.18-24.12.1.aarch64", "product_id": "kernel-obs-build-5.3.18-24.12.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.12.1.aarch64", "product": { "name": "kernel-obs-qa-5.3.18-24.12.1.aarch64", "product_id": "kernel-obs-qa-5.3.18-24.12.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-24.12.1.aarch64", "product": { "name": "kernel-preempt-5.3.18-24.12.1.aarch64", "product_id": "kernel-preempt-5.3.18-24.12.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-24.12.1.aarch64", "product": { "name": "kernel-preempt-devel-5.3.18-24.12.1.aarch64", "product_id": "kernel-preempt-devel-5.3.18-24.12.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-24.12.1.aarch64", "product": { "name": "kernel-preempt-extra-5.3.18-24.12.1.aarch64", "product_id": "kernel-preempt-extra-5.3.18-24.12.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-24.12.1.aarch64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-24.12.1.aarch64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-24.12.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.12.1.aarch64", "product": { "name": "kernel-syms-5.3.18-24.12.1.aarch64", "product_id": "kernel-syms-5.3.18-24.12.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.12.1.aarch64", "product": { "name": "kselftests-kmp-default-5.3.18-24.12.1.aarch64", "product_id": "kselftests-kmp-default-5.3.18-24.12.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-24.12.1.aarch64", "product": { "name": "kselftests-kmp-preempt-5.3.18-24.12.1.aarch64", "product_id": "kselftests-kmp-preempt-5.3.18-24.12.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.12.1.aarch64", "product": { "name": "ocfs2-kmp-default-5.3.18-24.12.1.aarch64", "product_id": "ocfs2-kmp-default-5.3.18-24.12.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-24.12.1.aarch64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-24.12.1.aarch64", "product_id": "ocfs2-kmp-preempt-5.3.18-24.12.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.12.1.aarch64", "product": { "name": "reiserfs-kmp-default-5.3.18-24.12.1.aarch64", "product_id": "reiserfs-kmp-default-5.3.18-24.12.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-24.12.1.aarch64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-24.12.1.aarch64", "product_id": "reiserfs-kmp-preempt-5.3.18-24.12.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.3.18-24.12.1.noarch", "product": { "name": "kernel-devel-5.3.18-24.12.1.noarch", "product_id": "kernel-devel-5.3.18-24.12.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-5.3.18-24.12.1.noarch", "product": { "name": "kernel-docs-5.3.18-24.12.1.noarch", "product_id": "kernel-docs-5.3.18-24.12.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-5.3.18-24.12.1.noarch", "product": { "name": "kernel-docs-html-5.3.18-24.12.1.noarch", "product_id": "kernel-docs-html-5.3.18-24.12.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-5.3.18-24.12.1.noarch", "product": { "name": "kernel-macros-5.3.18-24.12.1.noarch", "product_id": "kernel-macros-5.3.18-24.12.1.noarch" } }, { "category": "product_version", "name": "kernel-source-5.3.18-24.12.1.noarch", "product": { "name": "kernel-source-5.3.18-24.12.1.noarch", "product_id": "kernel-source-5.3.18-24.12.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.3.18-24.12.1.noarch", "product": { "name": "kernel-source-vanilla-5.3.18-24.12.1.noarch", "product_id": "kernel-source-vanilla-5.3.18-24.12.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.12.1.ppc64le", "product": { "name": "cluster-md-kmp-default-5.3.18-24.12.1.ppc64le", "product_id": "cluster-md-kmp-default-5.3.18-24.12.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.12.1.ppc64le", "product": { "name": "dlm-kmp-default-5.3.18-24.12.1.ppc64le", "product_id": "dlm-kmp-default-5.3.18-24.12.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.12.1.ppc64le", "product": { "name": "gfs2-kmp-default-5.3.18-24.12.1.ppc64le", "product_id": "gfs2-kmp-default-5.3.18-24.12.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-24.12.1.ppc64le", "product": { "name": "kernel-debug-5.3.18-24.12.1.ppc64le", "product_id": "kernel-debug-5.3.18-24.12.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-24.12.1.ppc64le", "product": { "name": "kernel-debug-devel-5.3.18-24.12.1.ppc64le", "product_id": "kernel-debug-devel-5.3.18-24.12.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-24.12.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-24.12.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-5.3.18-24.12.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.12.1.ppc64le", "product": { "name": "kernel-default-5.3.18-24.12.1.ppc64le", "product_id": "kernel-default-5.3.18-24.12.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.12.1.9.4.1.ppc64le", "product": { "name": "kernel-default-base-5.3.18-24.12.1.9.4.1.ppc64le", "product_id": "kernel-default-base-5.3.18-24.12.1.9.4.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.12.1.9.4.1.ppc64le", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.12.1.9.4.1.ppc64le", "product_id": "kernel-default-base-rebuild-5.3.18-24.12.1.9.4.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.12.1.ppc64le", "product": { "name": "kernel-default-devel-5.3.18-24.12.1.ppc64le", "product_id": "kernel-default-devel-5.3.18-24.12.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.12.1.ppc64le", "product": { "name": "kernel-default-extra-5.3.18-24.12.1.ppc64le", "product_id": "kernel-default-extra-5.3.18-24.12.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.12.1.ppc64le", "product": { "name": "kernel-default-livepatch-5.3.18-24.12.1.ppc64le", "product_id": "kernel-default-livepatch-5.3.18-24.12.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.12.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.12.1.ppc64le", "product_id": "kernel-default-livepatch-devel-5.3.18-24.12.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-24.12.1.ppc64le", "product": { "name": "kernel-kvmsmall-5.3.18-24.12.1.ppc64le", "product_id": "kernel-kvmsmall-5.3.18-24.12.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-24.12.1.ppc64le", "product": { "name": "kernel-kvmsmall-devel-5.3.18-24.12.1.ppc64le", "product_id": "kernel-kvmsmall-devel-5.3.18-24.12.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.12.1.ppc64le", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.12.1.ppc64le", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.12.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_12-default-1-5.3.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_12-default-1-5.3.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_12-default-1-5.3.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.12.1.ppc64le", "product": { "name": "kernel-obs-build-5.3.18-24.12.1.ppc64le", "product_id": "kernel-obs-build-5.3.18-24.12.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.12.1.ppc64le", "product": { "name": "kernel-obs-qa-5.3.18-24.12.1.ppc64le", "product_id": "kernel-obs-qa-5.3.18-24.12.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.12.1.ppc64le", "product": { "name": "kernel-syms-5.3.18-24.12.1.ppc64le", "product_id": "kernel-syms-5.3.18-24.12.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.12.1.ppc64le", "product": { "name": "kselftests-kmp-default-5.3.18-24.12.1.ppc64le", "product_id": "kselftests-kmp-default-5.3.18-24.12.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.12.1.ppc64le", "product": { "name": "ocfs2-kmp-default-5.3.18-24.12.1.ppc64le", "product_id": "ocfs2-kmp-default-5.3.18-24.12.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.12.1.ppc64le", "product": { "name": "reiserfs-kmp-default-5.3.18-24.12.1.ppc64le", "product_id": "reiserfs-kmp-default-5.3.18-24.12.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.12.1.s390x", "product": { "name": "cluster-md-kmp-default-5.3.18-24.12.1.s390x", "product_id": "cluster-md-kmp-default-5.3.18-24.12.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.12.1.s390x", "product": { "name": "dlm-kmp-default-5.3.18-24.12.1.s390x", "product_id": "dlm-kmp-default-5.3.18-24.12.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.12.1.s390x", "product": { "name": "gfs2-kmp-default-5.3.18-24.12.1.s390x", "product_id": "gfs2-kmp-default-5.3.18-24.12.1.s390x" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.12.1.s390x", "product": { "name": "kernel-default-5.3.18-24.12.1.s390x", "product_id": "kernel-default-5.3.18-24.12.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.12.1.9.4.1.s390x", "product": { "name": "kernel-default-base-5.3.18-24.12.1.9.4.1.s390x", "product_id": "kernel-default-base-5.3.18-24.12.1.9.4.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.12.1.9.4.1.s390x", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.12.1.9.4.1.s390x", "product_id": "kernel-default-base-rebuild-5.3.18-24.12.1.9.4.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.12.1.s390x", "product": { "name": "kernel-default-devel-5.3.18-24.12.1.s390x", "product_id": "kernel-default-devel-5.3.18-24.12.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.12.1.s390x", "product": { "name": "kernel-default-extra-5.3.18-24.12.1.s390x", "product_id": "kernel-default-extra-5.3.18-24.12.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.12.1.s390x", "product": { "name": "kernel-default-livepatch-5.3.18-24.12.1.s390x", "product_id": "kernel-default-livepatch-5.3.18-24.12.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.12.1.s390x", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.12.1.s390x", "product_id": "kernel-default-livepatch-devel-5.3.18-24.12.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_12-default-1-5.3.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_12-default-1-5.3.1.s390x", "product_id": "kernel-livepatch-5_3_18-24_12-default-1-5.3.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.12.1.s390x", "product": { "name": "kernel-obs-build-5.3.18-24.12.1.s390x", "product_id": "kernel-obs-build-5.3.18-24.12.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.12.1.s390x", "product": { "name": "kernel-obs-qa-5.3.18-24.12.1.s390x", "product_id": "kernel-obs-qa-5.3.18-24.12.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.12.1.s390x", "product": { "name": "kernel-syms-5.3.18-24.12.1.s390x", "product_id": "kernel-syms-5.3.18-24.12.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-5.3.18-24.12.1.s390x", "product": { "name": "kernel-zfcpdump-5.3.18-24.12.1.s390x", "product_id": "kernel-zfcpdump-5.3.18-24.12.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.12.1.s390x", "product": { "name": "kselftests-kmp-default-5.3.18-24.12.1.s390x", "product_id": "kselftests-kmp-default-5.3.18-24.12.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.12.1.s390x", "product": { "name": "ocfs2-kmp-default-5.3.18-24.12.1.s390x", "product_id": "ocfs2-kmp-default-5.3.18-24.12.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.12.1.s390x", "product": { "name": "reiserfs-kmp-default-5.3.18-24.12.1.s390x", "product_id": "reiserfs-kmp-default-5.3.18-24.12.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.12.1.x86_64", "product": { "name": "cluster-md-kmp-default-5.3.18-24.12.1.x86_64", "product_id": "cluster-md-kmp-default-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-24.12.1.x86_64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-24.12.1.x86_64", "product_id": "cluster-md-kmp-preempt-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.12.1.x86_64", "product": { "name": "dlm-kmp-default-5.3.18-24.12.1.x86_64", "product_id": "dlm-kmp-default-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-24.12.1.x86_64", "product": { "name": "dlm-kmp-preempt-5.3.18-24.12.1.x86_64", "product_id": "dlm-kmp-preempt-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.12.1.x86_64", "product": { "name": "gfs2-kmp-default-5.3.18-24.12.1.x86_64", "product_id": "gfs2-kmp-default-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-24.12.1.x86_64", "product": { "name": "gfs2-kmp-preempt-5.3.18-24.12.1.x86_64", "product_id": "gfs2-kmp-preempt-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-24.12.1.x86_64", "product": { "name": "kernel-debug-5.3.18-24.12.1.x86_64", "product_id": "kernel-debug-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-24.12.1.x86_64", "product": { "name": "kernel-debug-devel-5.3.18-24.12.1.x86_64", "product_id": "kernel-debug-devel-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-24.12.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-24.12.1.x86_64", "product_id": "kernel-debug-livepatch-devel-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.12.1.x86_64", "product": { "name": "kernel-default-5.3.18-24.12.1.x86_64", "product_id": "kernel-default-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.12.1.9.4.1.x86_64", "product": { "name": "kernel-default-base-5.3.18-24.12.1.9.4.1.x86_64", "product_id": "kernel-default-base-5.3.18-24.12.1.9.4.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.12.1.9.4.1.x86_64", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.12.1.9.4.1.x86_64", "product_id": "kernel-default-base-rebuild-5.3.18-24.12.1.9.4.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.12.1.x86_64", "product": { "name": "kernel-default-devel-5.3.18-24.12.1.x86_64", "product_id": "kernel-default-devel-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.12.1.x86_64", "product": { "name": "kernel-default-extra-5.3.18-24.12.1.x86_64", "product_id": "kernel-default-extra-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.12.1.x86_64", "product": { "name": "kernel-default-livepatch-5.3.18-24.12.1.x86_64", "product_id": "kernel-default-livepatch-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.12.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.12.1.x86_64", "product_id": "kernel-default-livepatch-devel-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-24.12.1.x86_64", "product": { "name": "kernel-kvmsmall-5.3.18-24.12.1.x86_64", "product_id": "kernel-kvmsmall-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-24.12.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-5.3.18-24.12.1.x86_64", "product_id": "kernel-kvmsmall-devel-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.12.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.12.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_12-default-1-5.3.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_12-default-1-5.3.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_12-default-1-5.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_12-preempt-1-5.3.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_12-preempt-1-5.3.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_12-preempt-1-5.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.12.1.x86_64", "product": { "name": "kernel-obs-build-5.3.18-24.12.1.x86_64", "product_id": "kernel-obs-build-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.12.1.x86_64", "product": { "name": "kernel-obs-qa-5.3.18-24.12.1.x86_64", "product_id": "kernel-obs-qa-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-24.12.1.x86_64", "product": { "name": "kernel-preempt-5.3.18-24.12.1.x86_64", "product_id": "kernel-preempt-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-24.12.1.x86_64", "product": { "name": "kernel-preempt-devel-5.3.18-24.12.1.x86_64", "product_id": "kernel-preempt-devel-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-24.12.1.x86_64", "product": { "name": "kernel-preempt-extra-5.3.18-24.12.1.x86_64", "product_id": "kernel-preempt-extra-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-24.12.1.x86_64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-24.12.1.x86_64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.12.1.x86_64", "product": { "name": "kernel-syms-5.3.18-24.12.1.x86_64", "product_id": "kernel-syms-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.12.1.x86_64", "product": { "name": "kselftests-kmp-default-5.3.18-24.12.1.x86_64", "product_id": "kselftests-kmp-default-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-24.12.1.x86_64", "product": { "name": "kselftests-kmp-preempt-5.3.18-24.12.1.x86_64", "product_id": "kselftests-kmp-preempt-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.12.1.x86_64", "product": { "name": "ocfs2-kmp-default-5.3.18-24.12.1.x86_64", "product_id": "ocfs2-kmp-default-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-24.12.1.x86_64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-24.12.1.x86_64", "product_id": "ocfs2-kmp-preempt-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.12.1.x86_64", "product": { "name": "reiserfs-kmp-default-5.3.18-24.12.1.x86_64", "product_id": "reiserfs-kmp-default-5.3.18-24.12.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-24.12.1.x86_64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-24.12.1.x86_64", "product_id": "reiserfs-kmp-preempt-5.3.18-24.12.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP2", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15 SP2", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15 SP2", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.12.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.aarch64" }, "product_reference": "kernel-default-5.3.18-24.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.12.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.ppc64le" }, "product_reference": "kernel-default-5.3.18-24.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.12.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.s390x" }, "product_reference": "kernel-default-5.3.18-24.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.12.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.x86_64" }, "product_reference": "kernel-default-5.3.18-24.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.12.1.9.4.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.aarch64" }, "product_reference": "kernel-default-base-5.3.18-24.12.1.9.4.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.12.1.9.4.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.ppc64le" }, "product_reference": "kernel-default-base-5.3.18-24.12.1.9.4.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.12.1.9.4.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.s390x" }, "product_reference": "kernel-default-base-5.3.18-24.12.1.9.4.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.12.1.9.4.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.x86_64" }, "product_reference": "kernel-default-base-5.3.18-24.12.1.9.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.12.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-24.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.12.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.ppc64le" }, "product_reference": "kernel-default-devel-5.3.18-24.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.12.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.s390x" }, "product_reference": "kernel-default-devel-5.3.18-24.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.12.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-24.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-24.12.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.12.1.noarch" }, "product_reference": "kernel-devel-5.3.18-24.12.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-24.12.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.12.1.noarch" }, "product_reference": "kernel-macros-5.3.18-24.12.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.12.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.12.1.aarch64" }, "product_reference": "kernel-preempt-5.3.18-24.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.12.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.12.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-24.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-24.12.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.12.1.noarch" }, "product_reference": "kernel-docs-5.3.18-24.12.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.12.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-24.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.12.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.ppc64le" }, "product_reference": "kernel-obs-build-5.3.18-24.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.12.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.s390x" }, "product_reference": "kernel-obs-build-5.3.18-24.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.12.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-24.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.12.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.12.1.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.12.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.12.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-24.12.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.12.1.noarch" }, "product_reference": "kernel-source-5.3.18-24.12.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.12.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.aarch64" }, "product_reference": "kernel-syms-5.3.18-24.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.12.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.ppc64le" }, "product_reference": "kernel-syms-5.3.18-24.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.12.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.s390x" }, "product_reference": "kernel-syms-5.3.18-24.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.12.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-24.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.12.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.12.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.12.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.s390x" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.12.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-24.12.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.ppc64le" }, "product_reference": "kernel-default-livepatch-5.3.18-24.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-24.12.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.s390x" }, "product_reference": "kernel-default-livepatch-5.3.18-24.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-24.12.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.x86_64" }, "product_reference": "kernel-default-livepatch-5.3.18-24.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-24.12.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-24.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-24.12.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.s390x" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-24.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-24.12.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-24.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-1-5.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-1-5.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-1-5.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-1-5.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-1-5.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-1-5.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.12.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.aarch64" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.12.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.12.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.s390x" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.12.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.x86_64" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.12.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.aarch64" }, "product_reference": "dlm-kmp-default-5.3.18-24.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.12.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.ppc64le" }, "product_reference": "dlm-kmp-default-5.3.18-24.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.12.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.s390x" }, "product_reference": "dlm-kmp-default-5.3.18-24.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.12.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.x86_64" }, "product_reference": "dlm-kmp-default-5.3.18-24.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.12.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.aarch64" }, "product_reference": "gfs2-kmp-default-5.3.18-24.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.12.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.ppc64le" }, "product_reference": "gfs2-kmp-default-5.3.18-24.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.12.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.s390x" }, "product_reference": "gfs2-kmp-default-5.3.18-24.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.12.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.x86_64" }, "product_reference": "gfs2-kmp-default-5.3.18-24.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.12.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.aarch64" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.12.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.12.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.s390x" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.12.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.x86_64" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-5.3.18-24.12.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.12.1.x86_64" }, "product_reference": "kernel-default-extra-5.3.18-24.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14314", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14314" } ], "notes": [ { "category": "general", "text": "A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14314", "url": "https://www.suse.com/security/cve/CVE-2020-14314" }, { "category": "external", "summary": "SUSE Bug 1173798 for CVE-2020-14314", "url": "https://bugzilla.suse.com/1173798" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T18:16:04Z", "details": "moderate" } ], "title": "CVE-2020-14314" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T18:16:04Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14356" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14356", "url": "https://www.suse.com/security/cve/CVE-2020-14356" }, { "category": "external", "summary": "SUSE Bug 1175213 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1175213" }, { "category": "external", "summary": "SUSE Bug 1176392 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1176392" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T18:16:04Z", "details": "moderate" } ], "title": "CVE-2020-14356" }, { "cve": "CVE-2020-16166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16166" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16166", "url": "https://www.suse.com/security/cve/CVE-2020-16166" }, { "category": "external", "summary": "SUSE Bug 1174757 for CVE-2020-16166", "url": "https://bugzilla.suse.com/1174757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.12.1.9.4.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.12.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.12.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T18:16:04Z", "details": "moderate" } ], "title": "CVE-2020-16166" } ] }
suse-su-2020:2610-1
Vulnerability from csaf_suse
Published
2020-09-11 09:12
Modified
2020-09-11 09:12
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup (bsc#1165629).
- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).
- CVE-2020-14356: Fixed a null pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213).
- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).
- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).
- CVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).
- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication Bluetooth might have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access (bsc#1171988).
- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).
The following non-security bugs were fixed:
- cifs: add support for fallocate mode 0 for non-sparse files (bsc#1175122).
- cifs: allow unlock flock and OFD lock across fork (bsc#1175122).
- cifs_atomic_open(): fix double-put on late allocation failure (bsc#1175122).
- cifs: Avoid doing network I/O while holding cache lock (bsc#1175122).
- cifs: call wake_up(&server->response_q) inside of cifs_reconnect() (bsc#1175122).
- cifs: Clean up DFS referral cache (bsc#1175122).
- cifs: document and cleanup dfs mount (bsc#1172428 bsc#1175122).
- cifs: do not ignore the SYNC flags in getattr (bsc#1175122).
- cifs: do not leak -EAGAIN for stat() during reconnect (bsc#1175122).
- cifs: do not share tcons with DFS (bsc#1175122).
- cifs: ensure correct super block for DFS reconnect (bsc#1175122).
- cifs: fail i/o on soft mounts if sessionsetup errors out (bsc#1175122).
- cifs: fiemap: do not return EINVAL if get nothing (bsc#1175122).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1172428 bsc#1175122).
- cifs: fix double free error on share and prefix (bsc#1172428 bsc#1175122).
- cifs: fix leaked reference on requeued write (bsc#1175122).
- cifs: fix NULL dereference in match_prepath (bsc#1175122).
- cifs: Fix null pointer check in cifs_read (bsc#1175122).
- cifs: Fix potential deadlock when updating vol in cifs_reconnect() (bsc#1175122).
- cifs: fix potential mismatch of UNC paths (bsc#1175122).
- cifs: fix rename() by ensuring source handle opened with DELETE bit (bsc#1175122).
- cifs: Fix return value in __update_cache_entry (bsc#1175122).
- cifs: fix soft mounts hanging in the reconnect code (bsc#1175122).
- cifs: Fix task struct use-after-free on reconnect (bsc#1175122).
- cifs: fix uninitialised lease_key in open_shroot() (bsc#1175122).
- cifs: fix unitialized variable poential problem with network I/O cache lock patch (bsc#1175122).
- cifs: Get rid of kstrdup_const()'d paths (bsc#1175122).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1175122).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1172428 bsc#1175122).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1175122).
- cifs: handle prefix paths in reconnect (bsc#1175122).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1172428 bsc#1175122).
- cifs: improve read performance for page size 64KB & cache=strict & vers=2.1+ (bsc#1175122).
- cifs: Introduce helpers for finding TCP connection (bsc#1175122).
- cifs: make sure we do not overflow the max EA buffer size (bsc#1175122).
- cifs: make use of cap_unix(ses) in cifs_reconnect_tcon() (bsc#1175122).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1172428 bsc#1175122).
- cifs: Merge is_path_valid() into get_normalized_path() (bsc#1175122).
- cifs: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1175122).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1172428 bsc#1175122).
- cifs: Optimize readdir on reparse points (bsc#1175122).
- cifs: potential unintitliazed error code in cifs_getattr() (bsc#1175122).
- cifs: protect updating server->dstaddr with a spinlock (bsc#1175122).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1172428 bsc#1175122).
- cifs: rename reconn_inval_dfs_target() (bsc#1172428 bsc#1175122).
- cifs: set correct max-buffer-size for smb2_ioctl_init() (bsc#1175122).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1175122).
- cifs: use mod_delayed_work() for &server->reconnect if already queued (bsc#1175122).
- cifs: use PTR_ERR_OR_ZERO() to simplify code (bsc#1175122).
- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175128).
- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).
- ip6_tunnel: allow not to count pkts on tstats by passing dev as NULL (bsc#1175515).
- ip_tunnel: allow not to count pkts on tstats by setting skb's dev to NULL (bsc#1175515).
- kabi: hide new parameter of ip6_dst_lookup_flow() (bsc#1165629).
- kabi: mask changes to struct ipv6_stub (bsc#1165629).
- mm: Avoid calling build_all_zonelists_init under hotplug context (bsc#1154366).
- mm, vmstat: reduce zone->lock holding time by /proc/pagetypeinfo (bsc#1175691).
- scripts/git_sort/git_sort.py: add bluetooth/bluetooth-next.git repository
- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).
- smb3: fix performance regression with setting mtime (bsc#1175122).
- smb3: query attributes on file close (bsc#1175122).
- smb3: remove unused flag passed into close functions (bsc#1175122).
- Update patch reference for a tipc fix patch (bsc#1175515)
- x86/unwind/orc: Fix ORC for newly forked tasks (bsc#1058115).
Patchnames
SUSE-2020-2610,SUSE-SLE-Module-Live-Patching-15-2020-2610,SUSE-SLE-Product-HA-15-2020-2610,SUSE-SLE-Product-HPC-15-2020-2610,SUSE-SLE-Product-SLES-15-2020-2610,SUSE-SLE-Product-SLES_SAP-15-2020-2610
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup (bsc#1165629).\n- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).\n- CVE-2020-14356: Fixed a null pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213).\n- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).\n- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).\n- CVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).\n- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication Bluetooth might have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access (bsc#1171988).\n- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).\n\nThe following non-security bugs were fixed:\n\n- cifs: add support for fallocate mode 0 for non-sparse files (bsc#1175122).\n- cifs: allow unlock flock and OFD lock across fork (bsc#1175122).\n- cifs_atomic_open(): fix double-put on late allocation failure (bsc#1175122).\n- cifs: Avoid doing network I/O while holding cache lock (bsc#1175122).\n- cifs: call wake_up(\u0026server-\u003eresponse_q) inside of cifs_reconnect() (bsc#1175122).\n- cifs: Clean up DFS referral cache (bsc#1175122).\n- cifs: document and cleanup dfs mount (bsc#1172428 bsc#1175122).\n- cifs: do not ignore the SYNC flags in getattr (bsc#1175122).\n- cifs: do not leak -EAGAIN for stat() during reconnect (bsc#1175122).\n- cifs: do not share tcons with DFS (bsc#1175122).\n- cifs: ensure correct super block for DFS reconnect (bsc#1175122).\n- cifs: fail i/o on soft mounts if sessionsetup errors out (bsc#1175122).\n- cifs: fiemap: do not return EINVAL if get nothing (bsc#1175122).\n- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1172428 bsc#1175122).\n- cifs: fix double free error on share and prefix (bsc#1172428 bsc#1175122).\n- cifs: fix leaked reference on requeued write (bsc#1175122).\n- cifs: fix NULL dereference in match_prepath (bsc#1175122).\n- cifs: Fix null pointer check in cifs_read (bsc#1175122).\n- cifs: Fix potential deadlock when updating vol in cifs_reconnect() (bsc#1175122).\n- cifs: fix potential mismatch of UNC paths (bsc#1175122).\n- cifs: fix rename() by ensuring source handle opened with DELETE bit (bsc#1175122).\n- cifs: Fix return value in __update_cache_entry (bsc#1175122).\n- cifs: fix soft mounts hanging in the reconnect code (bsc#1175122).\n- cifs: Fix task struct use-after-free on reconnect (bsc#1175122).\n- cifs: fix uninitialised lease_key in open_shroot() (bsc#1175122).\n- cifs: fix unitialized variable poential problem with network I/O cache lock patch (bsc#1175122).\n- cifs: Get rid of kstrdup_const()\u0027d paths (bsc#1175122).\n- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1175122).\n- cifs: handle empty list of targets in cifs_reconnect() (bsc#1172428 bsc#1175122).\n- cifs: handle hostnames that resolve to same ip in failover (bsc#1175122).\n- cifs: handle prefix paths in reconnect (bsc#1175122).\n- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1172428 bsc#1175122).\n- cifs: improve read performance for page size 64KB \u0026 cache=strict \u0026 vers=2.1+ (bsc#1175122).\n- cifs: Introduce helpers for finding TCP connection (bsc#1175122).\n- cifs: make sure we do not overflow the max EA buffer size (bsc#1175122).\n- cifs: make use of cap_unix(ses) in cifs_reconnect_tcon() (bsc#1175122).\n- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1172428 bsc#1175122).\n- cifs: Merge is_path_valid() into get_normalized_path() (bsc#1175122).\n- cifs: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1175122).\n- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1172428 bsc#1175122).\n- cifs: Optimize readdir on reparse points (bsc#1175122).\n- cifs: potential unintitliazed error code in cifs_getattr() (bsc#1175122).\n- cifs: protect updating server-\u003edstaddr with a spinlock (bsc#1175122).\n- cifs: reduce number of referral requests in DFS link lookups (bsc#1172428 bsc#1175122).\n- cifs: rename reconn_inval_dfs_target() (bsc#1172428 bsc#1175122).\n- cifs: set correct max-buffer-size for smb2_ioctl_init() (bsc#1175122).\n- cifs: set up next DFS target before generic_ip_connect() (bsc#1175122).\n- cifs: use mod_delayed_work() for \u0026server-\u003ereconnect if already queued (bsc#1175122).\n- cifs: use PTR_ERR_OR_ZERO() to simplify code (bsc#1175122).\n- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175128).\n- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).\n- ip6_tunnel: allow not to count pkts on tstats by passing dev as NULL (bsc#1175515).\n- ip_tunnel: allow not to count pkts on tstats by setting skb\u0027s dev to NULL (bsc#1175515).\n- kabi: hide new parameter of ip6_dst_lookup_flow() (bsc#1165629).\n- kabi: mask changes to struct ipv6_stub (bsc#1165629).\n- mm: Avoid calling build_all_zonelists_init under hotplug context (bsc#1154366).\n- mm, vmstat: reduce zone-\u003elock holding time by /proc/pagetypeinfo (bsc#1175691).\n- scripts/git_sort/git_sort.py: add bluetooth/bluetooth-next.git repository\n- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).\n- smb3: fix performance regression with setting mtime (bsc#1175122).\n- smb3: query attributes on file close (bsc#1175122).\n- smb3: remove unused flag passed into close functions (bsc#1175122).\n- Update patch reference for a tipc fix patch (bsc#1175515)\n- x86/unwind/orc: Fix ORC for newly forked tasks (bsc#1058115).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2610,SUSE-SLE-Module-Live-Patching-15-2020-2610,SUSE-SLE-Product-HA-15-2020-2610,SUSE-SLE-Product-HPC-15-2020-2610,SUSE-SLE-Product-SLES-15-2020-2610,SUSE-SLE-Product-SLES_SAP-15-2020-2610", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2610-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2610-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202610-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2610-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1154366", "url": "https://bugzilla.suse.com/1154366" }, { "category": "self", "summary": "SUSE Bug 1165629", "url": "https://bugzilla.suse.com/1165629" }, { "category": "self", "summary": "SUSE Bug 1165631", "url": "https://bugzilla.suse.com/1165631" }, { "category": "self", "summary": "SUSE Bug 1171988", "url": "https://bugzilla.suse.com/1171988" }, { "category": "self", "summary": "SUSE Bug 1172428", "url": "https://bugzilla.suse.com/1172428" }, { "category": "self", "summary": "SUSE Bug 1173798", "url": "https://bugzilla.suse.com/1173798" }, { "category": "self", "summary": "SUSE Bug 1174205", "url": "https://bugzilla.suse.com/1174205" }, { "category": "self", "summary": "SUSE Bug 1174757", "url": "https://bugzilla.suse.com/1174757" }, { "category": "self", "summary": "SUSE Bug 1175112", "url": "https://bugzilla.suse.com/1175112" }, { "category": "self", "summary": "SUSE Bug 1175122", "url": "https://bugzilla.suse.com/1175122" }, { "category": "self", "summary": "SUSE Bug 1175128", "url": "https://bugzilla.suse.com/1175128" }, { "category": "self", "summary": "SUSE Bug 1175204", "url": "https://bugzilla.suse.com/1175204" }, { "category": "self", "summary": "SUSE Bug 1175213", "url": "https://bugzilla.suse.com/1175213" }, { "category": "self", "summary": "SUSE Bug 1175515", "url": "https://bugzilla.suse.com/1175515" }, { "category": "self", "summary": "SUSE Bug 1175518", "url": "https://bugzilla.suse.com/1175518" }, { "category": "self", "summary": "SUSE Bug 1175691", "url": "https://bugzilla.suse.com/1175691" }, { "category": "self", "summary": "SUSE Bug 1175992", "url": "https://bugzilla.suse.com/1175992" }, { "category": "self", "summary": "SUSE Bug 1176069", "url": "https://bugzilla.suse.com/1176069" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14314 page", "url": "https://www.suse.com/security/cve/CVE-2020-14314/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14356 page", "url": "https://www.suse.com/security/cve/CVE-2020-14356/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14386 page", "url": "https://www.suse.com/security/cve/CVE-2020-14386/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16166 page", "url": "https://www.suse.com/security/cve/CVE-2020-16166/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1749 page", "url": "https://www.suse.com/security/cve/CVE-2020-1749/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24394 page", "url": "https://www.suse.com/security/cve/CVE-2020-24394/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-09-11T09:12:12Z", "generator": { "date": "2020-09-11T09:12:12Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2610-1", "initial_release_date": "2020-09-11T09:12:12Z", "revision_history": [ { "date": "2020-09-11T09:12:12Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.58.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.58.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-150.58.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.58.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-150.58.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-150.58.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.58.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-150.58.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-150.58.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.58.1.aarch64", "product": { "name": "kernel-default-4.12.14-150.58.1.aarch64", "product_id": "kernel-default-4.12.14-150.58.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.58.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-150.58.1.aarch64", "product_id": "kernel-default-base-4.12.14-150.58.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.58.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-150.58.1.aarch64", "product_id": "kernel-default-devel-4.12.14-150.58.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.58.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-150.58.1.aarch64", "product_id": "kernel-default-extra-4.12.14-150.58.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.58.1.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-150.58.1.aarch64", "product_id": "kernel-default-livepatch-4.12.14-150.58.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.58.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.58.1.aarch64", "product_id": "kernel-default-livepatch-devel-4.12.14-150.58.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.58.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-150.58.1.aarch64", "product_id": "kernel-obs-build-4.12.14-150.58.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.58.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-150.58.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-150.58.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.58.1.aarch64", "product": { "name": "kernel-syms-4.12.14-150.58.1.aarch64", "product_id": "kernel-syms-4.12.14-150.58.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.58.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-150.58.1.aarch64", "product_id": "kernel-vanilla-4.12.14-150.58.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.58.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-150.58.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-150.58.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.58.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.58.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-150.58.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.58.1.aarch64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.58.1.aarch64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.58.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.58.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-150.58.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-150.58.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.58.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.58.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-150.58.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.58.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.58.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-150.58.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-150.58.1.noarch", "product": { "name": "kernel-devel-4.12.14-150.58.1.noarch", "product_id": "kernel-devel-4.12.14-150.58.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-150.58.1.noarch", "product": { "name": "kernel-docs-4.12.14-150.58.1.noarch", "product_id": "kernel-docs-4.12.14-150.58.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-150.58.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-150.58.1.noarch", "product_id": "kernel-docs-html-4.12.14-150.58.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-150.58.1.noarch", "product": { "name": "kernel-macros-4.12.14-150.58.1.noarch", "product_id": "kernel-macros-4.12.14-150.58.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-150.58.1.noarch", "product": { "name": "kernel-source-4.12.14-150.58.1.noarch", "product_id": "kernel-source-4.12.14-150.58.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-150.58.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-150.58.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-150.58.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.58.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-150.58.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-150.58.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.58.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-150.58.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-150.58.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.58.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-150.58.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-150.58.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.58.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-150.58.1.ppc64le", "product_id": "kernel-debug-4.12.14-150.58.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.58.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-150.58.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-150.58.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.58.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-150.58.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-150.58.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150.58.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150.58.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-4.12.14-150.58.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.58.1.ppc64le", "product": { "name": "kernel-default-4.12.14-150.58.1.ppc64le", "product_id": "kernel-default-4.12.14-150.58.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.58.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-150.58.1.ppc64le", "product_id": "kernel-default-base-4.12.14-150.58.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.58.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-150.58.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-150.58.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.58.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-150.58.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-150.58.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.58.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-150.58.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-150.58.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.58.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.58.1.ppc64le", "product_id": "kernel-default-livepatch-devel-4.12.14-150.58.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.58.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-150.58.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-150.58.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.58.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-150.58.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-150.58.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.58.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-150.58.1.ppc64le", "product_id": "kernel-syms-4.12.14-150.58.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.58.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-150.58.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-150.58.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-150.58.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.58.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-150.58.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-150.58.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.58.1.ppc64le", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.58.1.ppc64le", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.58.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.58.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-150.58.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-150.58.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.58.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-150.58.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-150.58.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-150.58.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.58.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-150.58.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-150.58.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.58.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-150.58.1.s390x", "product_id": "dlm-kmp-default-4.12.14-150.58.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.58.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-150.58.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-150.58.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.58.1.s390x", "product": { "name": "kernel-default-4.12.14-150.58.1.s390x", "product_id": "kernel-default-4.12.14-150.58.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.58.1.s390x", "product": { "name": "kernel-default-base-4.12.14-150.58.1.s390x", "product_id": "kernel-default-base-4.12.14-150.58.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.58.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-150.58.1.s390x", "product_id": "kernel-default-devel-4.12.14-150.58.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.58.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-150.58.1.s390x", "product_id": "kernel-default-extra-4.12.14-150.58.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.58.1.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-150.58.1.s390x", "product_id": "kernel-default-livepatch-4.12.14-150.58.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.58.1.s390x", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.58.1.s390x", "product_id": "kernel-default-livepatch-devel-4.12.14-150.58.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-150.58.1.s390x", "product": { "name": "kernel-default-man-4.12.14-150.58.1.s390x", "product_id": "kernel-default-man-4.12.14-150.58.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.58.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-150.58.1.s390x", "product_id": "kernel-obs-build-4.12.14-150.58.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.58.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-150.58.1.s390x", "product_id": "kernel-obs-qa-4.12.14-150.58.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.58.1.s390x", "product": { "name": "kernel-syms-4.12.14-150.58.1.s390x", "product_id": "kernel-syms-4.12.14-150.58.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.58.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-150.58.1.s390x", "product_id": "kernel-vanilla-4.12.14-150.58.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.58.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-150.58.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-150.58.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.58.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-150.58.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-150.58.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.58.1.s390x", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.58.1.s390x", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.58.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-150.58.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-150.58.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-150.58.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-150.58.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-150.58.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-150.58.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.58.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-150.58.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-150.58.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.58.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-150.58.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-150.58.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.58.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-150.58.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-150.58.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.58.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.58.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-150.58.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.58.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-150.58.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-150.58.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.58.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-150.58.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-150.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.58.1.x86_64", "product": { "name": "kernel-debug-4.12.14-150.58.1.x86_64", "product_id": "kernel-debug-4.12.14-150.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.58.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-150.58.1.x86_64", "product_id": "kernel-debug-base-4.12.14-150.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.58.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-150.58.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-150.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150.58.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150.58.1.x86_64", "product_id": "kernel-debug-livepatch-devel-4.12.14-150.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.58.1.x86_64", "product": { "name": "kernel-default-4.12.14-150.58.1.x86_64", "product_id": "kernel-default-4.12.14-150.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.58.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-150.58.1.x86_64", "product_id": "kernel-default-base-4.12.14-150.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.58.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-150.58.1.x86_64", "product_id": "kernel-default-devel-4.12.14-150.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.58.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-150.58.1.x86_64", "product_id": "kernel-default-extra-4.12.14-150.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.58.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-150.58.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-150.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.58.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.58.1.x86_64", "product_id": "kernel-default-livepatch-devel-4.12.14-150.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-150.58.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-150.58.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-150.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-150.58.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-150.58.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-150.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-150.58.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-150.58.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-150.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.58.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.58.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64", "product_id": "kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.58.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-150.58.1.x86_64", "product_id": "kernel-obs-build-4.12.14-150.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.58.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-150.58.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-150.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.58.1.x86_64", "product": { "name": "kernel-syms-4.12.14-150.58.1.x86_64", "product_id": "kernel-syms-4.12.14-150.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.58.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-150.58.1.x86_64", "product_id": "kernel-vanilla-4.12.14-150.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.58.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-150.58.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-150.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.58.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.58.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-150.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.58.1.x86_64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.58.1.x86_64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.58.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.58.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-150.58.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-150.58.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.58.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.58.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-150.58.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-150.58.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.58.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-150.58.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.58.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.58.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.58.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.58.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.58.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.58.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.58.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-150.58.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.58.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-150.58.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.58.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-150.58.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.58.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.58.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.58.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-150.58.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.58.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-150.58.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.58.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.58.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.58.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.58.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.58.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.58.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.58.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.58.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.58.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.58.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.58.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.58.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.58.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.58.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.58.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.58.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.58.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.58.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.58.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.58.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.58.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.58.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.58.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.58.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.58.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.58.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.58.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.58.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.58.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.58.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.58.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.58.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.58.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.58.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.58.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.58.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.58.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.58.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.58.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.58.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.58.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.58.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.58.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.58.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.58.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.58.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.58.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.58.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.58.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.58.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.58.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.58.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.58.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.58.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-150.58.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.58.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.s390x" }, "product_reference": "kernel-default-4.12.14-150.58.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.58.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.58.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.58.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150.58.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.58.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-150.58.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.58.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.58.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.58.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150.58.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.58.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-150.58.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-150.58.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.58.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-150.58.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.58.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.58.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.58.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.58.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.58.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.58.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.58.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.58.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.58.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150.58.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.58.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-150.58.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.58.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.58.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.58.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.58.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.58.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.58.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150.58.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.58.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.s390x" }, "product_reference": "kernel-syms-4.12.14-150.58.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.58.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.58.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.58.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.58.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.s390x" }, "product_reference": "kernel-vanilla-base-4.12.14-150.58.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.58.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.58.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.58.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.58.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.58.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.58.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-150.58.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.58.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150.58.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.58.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150.58.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.58.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.58.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.58.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.58.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.58.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.58.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.58.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.58.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.58.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.58.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150.58.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.58.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.58.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.58.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.58.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150.58.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.58.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.58.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.58.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-11T09:12:12Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-14314", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14314" } ], "notes": [ { "category": "general", "text": "A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14314", "url": "https://www.suse.com/security/cve/CVE-2020-14314" }, { "category": "external", "summary": "SUSE Bug 1173798 for CVE-2020-14314", "url": "https://bugzilla.suse.com/1173798" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-11T09:12:12Z", "details": "moderate" } ], "title": "CVE-2020-14314" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-11T09:12:12Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14356" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14356", "url": "https://www.suse.com/security/cve/CVE-2020-14356" }, { "category": "external", "summary": "SUSE Bug 1175213 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1175213" }, { "category": "external", "summary": "SUSE Bug 1176392 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1176392" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-11T09:12:12Z", "details": "moderate" } ], "title": "CVE-2020-14356" }, { "cve": "CVE-2020-14386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14386" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14386", "url": "https://www.suse.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "SUSE Bug 1176069 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176069" }, { "category": "external", "summary": "SUSE Bug 1176072 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-11T09:12:12Z", "details": "important" } ], "title": "CVE-2020-14386" }, { "cve": "CVE-2020-16166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16166" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16166", "url": "https://www.suse.com/security/cve/CVE-2020-16166" }, { "category": "external", "summary": "SUSE Bug 1174757 for CVE-2020-16166", "url": "https://bugzilla.suse.com/1174757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-11T09:12:12Z", "details": "moderate" } ], "title": "CVE-2020-16166" }, { "cve": "CVE-2020-1749", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1749" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1749", "url": "https://www.suse.com/security/cve/CVE-2020-1749" }, { "category": "external", "summary": "SUSE Bug 1165629 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165629" }, { "category": "external", "summary": "SUSE Bug 1165631 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165631" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177513" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1189302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-11T09:12:12Z", "details": "important" } ], "title": "CVE-2020-1749" }, { "cve": "CVE-2020-24394", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24394" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24394", "url": "https://www.suse.com/security/cve/CVE-2020-24394" }, { "category": "external", "summary": "SUSE Bug 1175518 for CVE-2020-24394", "url": "https://bugzilla.suse.com/1175518" }, { "category": "external", "summary": "SUSE Bug 1175992 for CVE-2020-24394", "url": "https://bugzilla.suse.com/1175992" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.58.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.58.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.58.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-11T09:12:12Z", "details": "important" } ], "title": "CVE-2020-24394" } ] }
suse-su-2020:2541-1
Vulnerability from csaf_suse
Published
2020-09-04 15:36
Modified
2020-09-04 15:36
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup (bsc#1165629).
- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).
- CVE-2020-14356: Fixed a null pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213).
- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).
- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).
- CVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).
- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication Bluetooth might have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access (bsc#1171988).
The following non-security bugs were fixed:
- ACPI: kABI fixes for subsys exports (bsc#1174968).
- ACPI / LPSS: Resume BYT/CHT I2C controllers from resume_noirq (bsc#1174968).
- ACPI / LPSS: Use acpi_lpss_* instead of acpi_subsys_* functions for hibernate (bsc#1174968).
- ACPI: PM: Introduce 'poweroff' callbacks for ACPI PM domain and LPSS (bsc#1174968).
- ACPI: PM: Simplify and fix PM domain hibernation callbacks (bsc#1174968).
- af_key: pfkey_dump needs parameter validation (git-fixes).
- agp/intel: Fix a memory leak on module initialisation failure (git-fixes).
- ALSA: core: pcm_iec958: fix kernel-doc (bsc#1111666).
- ALSA: echoaduio: Drop superfluous volatile modifier (bsc#1111666).
- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (bsc#1111666).
- ALSA: hda: Add support for Loongson 7A1000 controller (bsc#1111666).
- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (bsc#1111666).
- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (bsc#1111666).
- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (bsc#1111666).
- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).
- ALSA: hda: fix snd_hda_codec_cleanup() documentation (bsc#1111666).
- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (bsc#1111666).
- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (bsc#1111666).
- ALSA: hda/realtek: Add model alc298-samsung-headphone (git-fixes).
- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (bsc#1111666).
- ALSA: hda/realtek - Add quirk for Lenovo Carbon X1 8th gen (bsc#1111666).
- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (bsc#1111666).
- ALSA: hda/realtek - Add quirk for MSI GL63 (bsc#1111666).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex Book (git-fixes).
- ALSA: hda/realtek - change to suitable link model for ASUS platform (bsc#1111666).
- ALSA: hda/realtek - Check headset type by unplug and resume (bsc#1111666).
- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (bsc#1111666).
- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (bsc#1111666).
- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (bsc#1111666).
- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (bsc#1111666).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (bsc#1111666).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (bsc#1111666).
- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (bsc#1111666).
- ALSA: hda/realtek: Fix add a 'ultra_low_power' function for intel reference board (alc256) (bsc#1111666).
- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (bsc#1111666).
- ALSA: hda/realtek - Fixed HP right speaker no sound (bsc#1111666).
- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (bsc#1111666).
- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (bsc#1111666).
- ALSA: hda/realtek - Fix unused variable warning (bsc#1111666).
- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (bsc#1111666).
- ALSA: hda - reverse the setting value in the micmute_led_set (bsc#1111666).
- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).
- ALSA: pci: delete repeated words in comments (bsc#1111666).
- ALSA: seq: oss: Serialize ioctls (bsc#1111666).
- ALSA: usb-audio: Add capture support for Saffire 6 (USB 1.1) (git-fixes).
- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (bsc#1111666).
- ALSA: usb-audio: add startech usb audio dock name (bsc#1111666).
- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (bsc#1111666).
- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (bsc#1111666).
- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (bsc#1111666).
- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (bsc#1111666).
- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).
- ALSA: usb-audio: fix spelling mistake 'buss' -> 'bus' (bsc#1111666).
- ALSA: usb-audio: ignore broken processing/extension unit (git-fixes).
- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (bsc#1111666).
- ALSA: usb/line6: remove 'defined but not used' warning (bsc#1111666).
- arm64: Add MIDR encoding for HiSilicon Taishan CPUs (bsc#1174547).
- arm64: Add MIDR encoding for NVIDIA CPUs (bsc#1174547).
- arm64: add sysfs vulnerability show for meltdown (bsc#1174547).
- arm64: Add sysfs vulnerability show for spectre-v1 (bsc#1174547).
- arm64: add sysfs vulnerability show for spectre-v2 (bsc#1174547).
- arm64: add sysfs vulnerability show for speculative store bypass (bsc#1174547).
- arm64: Advertise mitigation of Spectre-v2, or lack thereof (bsc#1174547).
- arm64: Always enable spectre-v2 vulnerability detection (bsc#1174547).
- arm64: Always enable ssb vulnerability detection (bsc#1174547).
- arm64: backtrace: Do not bother trying to unwind the userspace stack (bsc#1175397).
- arm64: capabilities: Add NVIDIA Denver CPU to bp_harden list (bsc#1174547).
- arm64: capabilities: Merge duplicate Cavium erratum entries (bsc#1174547).
- arm64: capabilities: Merge entries for ARM64_WORKAROUND_CLEAN_CACHE (bsc#1174547).
- arm64: cpufeature: Enable Qualcomm Falkor/Kryo errata 1003 (bsc#1175398).
- arm64: Do not mask out PTE_RDONLY in pte_same() (bsc#1175393).
- arm64: enable generic CPU vulnerabilites support (bsc#1174547). Update config/arm64/default
- arm64: Ensure VM_WRITE|VM_SHARED ptes are clean by default (bsc#1175394).
- arm64: errata: Do not define type field twice for arm64_errata entries (bsc#1174547).
- arm64: errata: Update stale comment (bsc#1174547).
- arm64: Get rid of __smccc_workaround_1_hvc_* (bsc#1174547).
- arm64: kpti: Avoid rewriting early page tables when KASLR is enabled (bsc#1174547).
- arm64: kpti: Update arm64_kernel_use_ng_mappings() when forced on (bsc#1174547).
- arm64: kpti: Whitelist Cortex-A CPUs that do not implement the CSV3 field (bsc#1174547).
- arm64: kpti: Whitelist HiSilicon Taishan v110 CPUs (bsc#1174547).
- arm64: KVM: Avoid setting the upper 32 bits of VTCR_EL2 to 1 (bsc#1133021).
- arm64: KVM: Guests can skip __install_bp_hardening_cb()s HYP work (bsc#1174547).
- arm64: KVM: Use SMCCC_ARCH_WORKAROUND_1 for Falkor BP hardening (bsc#1174547).
- arm64: mm: Fix pte_mkclean, pte_mkdirty semantics (bsc#1175526).
- arm64: Provide a command line to disable spectre_v2 mitigation (bsc#1174547).
- arm64: Silence clang warning on mismatched value/register sizes (bsc#1175396).
- arm64/speculation: Support 'mitigations=' cmdline option (bsc#1174547).
- arm64: ssbd: explicitly depend on <linux/prctl.h> (bsc#1175399).
- arm64: ssbs: Do not treat CPUs with SSBS as unaffected by SSB (bsc#1174547).
- arm64: ssbs: Fix context-switch when SSBS is present on all CPUs (bsc#1175669).
- arm64/sve: Fix wrong free for task->thread.sve_state (bsc#1175400).
- arm64/sve: <uapi/asm/ptrace.h> should not depend on <uapi/linux/prctl.h> (bsc#1175401).
- arm64: tlbflush: avoid writing RES0 bits (bsc#1175402).
- arm64: Use firmware to detect CPUs that are not affected by Spectre-v2 (bsc#1174547).
- ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17 (bsc#1133021).
- ARM: KVM: invalidate icache on guest exit for Cortex-A15 (bsc#1133021).
- ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15 (bsc#1133021).
- ASoC: hda/tegra: Set buffer alignment to 128 bytes (bsc#1111666).
- ASoC: intel: Fix memleak in sst_media_open (git-fixes).
- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).
- AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).
- AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).
- AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).
- ax88172a: fix ax88172a_unbind() failures (git-fixes).
- b43: Remove uninitialized_var() usage (git-fixes).
- bcache: allocate meta data pages as compound pages (bsc#1172873).
- block: check queue's limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).
- block: Fix use-after-free in blkdev_get() (bsc#1174843).
- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).
- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (bsc#1111666).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (bsc#1111666).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (bsc#1111666).
- bonding: fix active-backup failover for current ARP slave (bsc#1174771).
- bonding: fix a potential double-unregister (git-fixes).
- bonding: show saner speed for broadcast mode (git-fixes).
- bpf: Fix map leak in HASH_OF_MAPS map (git-fixes).
- brcmfmac: keep SDIO watchdog running when console_interval is non-zero (bsc#1111666).
- brcmfmac: set state of hanger slot to FREE when flushing PSQ (bsc#1111666).
- brcmfmac: To fix Bss Info flag definition Bug (bsc#1111666).
- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).
- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).
- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).
- btrfs: fix block group leak when removing fails (bsc#1175149).
- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).
- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).
- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).
- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).
- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).
- btrfs: fix memory leaks after failure to lookup checksums during inode logging (bsc#1175550).
- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).
- btrfs: fix race between block group removal and block group creation (bsc#1175149).
- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).
- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).
- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).
- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).
- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).
- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).
- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).
- btrfs: Open code btrfs_write_and_wait_marked_extents (bsc#1175149).
- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).
- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).
- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).
- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).
- btrfs: Rename and export clear_btree_io_tree (bsc#1175149).
- btrfs: treat RWF_{,D}SYNC writes as sync for CRCs (bsc#1175493).
- bus: hisi_lpc: Add .remove method to avoid driver unbind crash (bsc#1174658).
- bus: hisi_lpc: Do not fail probe for unrecognised child devices (bsc#1174658).
- bus: hisi_lpc: Unregister logical PIO range to avoid potential use-after-free (bsc#1174658).
- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).
- cfg80211: check vendor command doit pointer before use (git-fixes).
- char: virtio: Select VIRTIO from VIRTIO_CONSOLE (bsc#1175667).
- cifs: document and cleanup dfs mount (bsc#1144333 bsc#1172428).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1144333 bsc#1172428).
- cifs: fix double free error on share and prefix (bsc#1144333 bsc#1172428).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1144333 bsc#1172428).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1144333 bsc#1172428).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1144333 bsc#1172428).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1144333 bsc#1172428).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1144333 bsc#1172428).
- cifs: rename reconn_inval_dfs_target() (bsc#1144333 bsc#1172428).
- clk: at91: clk-generated: check best_rate against ranges (bsc#1111666).
- clk: clk-atlas6: fix return value check in atlas6_clk_init() (bsc#1111666).
- clk: iproc: round clock rate to the closest (bsc#1111666).
- clk: spear: Remove uninitialized_var() usage (git-fixes).
- clk: st: Remove uninitialized_var() usage (git-fixes).
- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1174549
- console: newport_con: fix an issue about leak related system resources (git-fixes).
- constrants: fix malformed XML Closing tag of an element is '</foo>', not '<foo/>'. Fixes: 8b37de2eb835 ('rpm/constraints.in: Increase memory for kernel-docs')
- Created new preempt kernel flavor (jsc#SLE-11309) Configs are cloned from the respective $arch/default configs. All changed configs appart from CONFIG_PREEMPT->y are a result of dependencies, namely many lock/unlock primitives are no longer inlined in the preempt kernel. TREE_RCU has been also changed to PREEMPT_RCU which is the default implementation for PREEMPT kernel.
- crypto: ccp - Fix use of merged scatterlists (git-fixes).
- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).
- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).
- crypto: rockchip - fix scatterlist nents error (git-fixes).
- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).
- crypto: talitos - check AES key size (git-fixes).
- crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK (git-fixes).
- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- dev: Defer free of skbs in flush_backlog (git-fixes).
- device property: Fix the secondary firmware node handling in set_primary_fwnode() (git-fixes).
- devres: keep both device name and resource name in pretty name (git-fixes).
- dlm: Fix kobject memleak (bsc#1175768).
- dlm: remove BUG() before panic() (bsc#1174844).
- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).
- Documentation/networking: Add net DIM documentation (bsc#1174852).
- dpaa2-eth: Fix passing zero to 'PTR_ERR' warning (bsc#1175403).
- dpaa2-eth: free already allocated channels on probe defer (bsc#1175404).
- dpaa2-eth: prevent array underflow in update_cls_rule() (bsc#1175405).
- dpaa_eth: add dropped frames to percpu ethtool stats (bsc#1174550).
- dpaa_eth: add newline in dev_err() msg (bsc#1174550).
- dpaa_eth: avoid timestamp read on error paths (bsc#1175406).
- dpaa_eth: change DMA device (bsc#1174550).
- dpaa_eth: cleanup skb_to_contig_fd() (bsc#1174550).
- dpaa_eth: defer probing after qbman (bsc#1174550).
- dpaa_eth: extend delays in ndo_stop (bsc#1174550).
- dpaa_eth: fix DMA mapping leak (bsc#1174550).
- dpaa_eth: Fix one possible memleak in dpaa_eth_probe (bsc#1174550).
- dpaa_eth: FMan erratum A050385 workaround (bsc#1174550).
- dpaa_eth: perform DMA unmapping before read (bsc#1175407).
- dpaa_eth: register a device link for the qman portal used (bsc#1174550).
- dpaa_eth: remove netdev_err() for user errors (bsc#1174550).
- dpaa_eth: remove redundant code (bsc#1174550).
- dpaa_eth: simplify variables used in dpaa_cleanup_tx_fd() (bsc#1174550).
- dpaa_eth: use a page to store the SGT (bsc#1174550).
- dpaa_eth: use fd information in dpaa_cleanup_tx_fd() (bsc#1174550).
- dpaa_eth: use only one buffer pool per interface (bsc#1174550).
- dpaa_eth: use page backed rx buffers (bsc#1174550).
- driver core: Avoid binding drivers to dead devices (git-fixes).
- Drivers: hv: balloon: Remove dependencies on guest page size (git-fixes).
- Drivers: hv: vmbus: Fix virt_to_hvpfn() for X86_PAE (git-fixes).
- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127, bsc#1175128).
- Drivers: hv: vmbus: Remove the undesired put_cpu_ptr() in hv_synic_cleanup() (git-fixes).
- drivers/perf: hisi: Fix typo in events attribute array (bsc#1175408).
- drivers/perf: hisi: Fixup one DDRC PMU register offset (bsc#1175410).
- drivers/perf: hisi: Fix wrong value for all counters enable (bsc#1175409).
- drm: Added orientation quirk for ASUS tablet model T103HAF (bsc#1111666).
- drm/amd/display: fix pow() crashing when given base 0 (git-fixes).
- drm/amdgpu: avoid dereferencing a NULL pointer (bsc#1111666).
- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (bsc#1111666).
- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (bsc#1113956) * refresh for context changes
- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).
- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1113956)
- drm/arm: fix unintentional integer overflow on left shift (git-fixes).
- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1113956) * refreshed for context changes
- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).
- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1113956) * move drm_mipi_dbi.c -> tinydrm/mipi-drm.c * refresh for context changes
- drm/debugfs: fix plain echo to connector 'force' attribute (bsc#1111666).
- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).
- drm/etnaviv: fix ref count leak via pm_runtime_get_sync (bsc#1111666).
- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (bsc#1112178) * updated names of get/put functions
- drm: hold gem reference until object is no longer accessed (bsc#1113956)
- drm/imx: fix use after free (git-fixes).
- drm/imx: imx-ldb: Disable both channels for split mode in enc->disable() (git-fixes).
- drm/imx: tve: fix regulator_disable error path (git-fixes).
- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).
- drm/msm/adreno: fix updating ring fence (git-fixes).
- drm/msm: ratelimit crtc event overflow error (bsc#1111666).
- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).
- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).
- drm/nouveau: fix multiple instances of reference count leaks (bsc#1111666).
- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).
- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).
- drm/radeon: disable AGP by default (bsc#1111666).
- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).
- drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync (bsc#1111666).
- drm/rockchip: fix VOP_WIN_GET macro (bsc#1175411).
- drm/tilcdc: fix leak & null ref in panel_connector_get_modes (bsc#1111666).
- drm/ttm/nouveau: do not call tt destroy callback on alloc failure (bsc#1175232).
- drm/vmwgfx: Fix two list_for_each loop exit tests (bsc#1111666).
- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (bsc#1111666).
- drm/xen-front: Fix misused IS_ERR_OR_NULL checks (bsc#1065600).
- efi/memreserve: deal with memreserve entries in unmapped memory (bsc#1174685).
- ext4: check journal inode extents more carefully (bsc#1173485).
- ext4: do not allow overlapping system zones (bsc#1173485).
- ext4: fix checking of directory entry validity for inline directories (bsc#1175771).
- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1174840).
- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).
- fat: do not allow to mount if the FAT length == 0 (bsc#1174845).
- fbdev: Detect integer underflow at 'struct fbcon_ops'->clear_margins. (bsc#1112178) * move files drivers/video/fbdev/core -> drivers/video/console * refresh for context changes
- firmware: google: check if size is valid when decoding VPD data (git-fixes).
- firmware: google: increment VPD key_len properly (git-fixes).
- fpga: dfl: fix bug in port reset handshake (git-fixes).
- fsl/fman: add API to get the device behind a fman port (bsc#1174550).
- fsl/fman: check dereferencing null pointer (git-fixes).
- fsl/fman: detect FMan erratum A050385 (bsc#1174550).
- fsl/fman: do not touch liodn base regs reserved on non-PAMU SoCs (bsc#1174550).
- fsl/fman: fix dereference null return value (git-fixes).
- fsl/fman: fix eth hash table allocation (git-fixes).
- fsl/fman: fix unreachable code (git-fixes).
- fsl/fman: remove unused struct member (bsc#1174550).
- fsl/fman: use 32-bit unsigned integer (git-fixes).
- fuse: fix memleak in cuse_channel_open (bsc#1174926).
- fuse: fix missing unlock_page in fuse_writepage() (bsc#1174904).
- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175062).
- fuse: fix weird page warning (bsc#1175063).
- fuse: flush dirty data/metadata before non-truncate setattr (bsc#1175064).
- fuse: truncate pending writes on O_TRUNC (bsc#1175065).
- fuse: verify attributes (bsc#1175066).
- fuse: verify nlink (bsc#1175067).
- genetlink: remove genl_bind (networking-stable-20_07_17).
- go7007: add sanity checking for endpoints (git-fixes).
- gpu: host1x: debug: Fix multiple channels emitting messages simultaneously (bsc#1111666).
- HID: hiddev: fix mess in hiddev_open() (git-fixes).
- HISI LPC: Re-Add ACPI child enumeration support (bsc#1174658).
- HISI LPC: Stop using MFD APIs (bsc#1174658).
- hv_balloon: Balloon up according to request page number (git-fixes).
- hv_balloon: Use a static page for the balloon_up send buffer (git-fixes).
- hv_netvsc: Allow scatter-gather feature to be tunable (git-fixes).
- hv_netvsc: do not use VF device if link is down (git-fixes).
- hv_netvsc: Fix a warning of suspicious RCU usage (git-fixes).
- hv_netvsc: Fix error handling in netvsc_attach() (git-fixes).
- hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (git-fixes).
- hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (git-fixes).
- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (git-fixes).
- hv_netvsc: flag software created hash value (git-fixes).
- hv_netvsc: Remove 'unlikely' from netvsc_select_queue (git-fixes).
- i2c: rcar: in slave mode, clear NACK earlier (git-fixes).
- i2c: rcar: slave: only send STOP event when we have been addressed (bsc#1111666).
- i40e: Fix crash during removing i40e driver (git-fixes).
- i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (git-fixes).
- ibmveth: Fix use of ibmveth in a bridge (bsc#1174387 ltc#187506).
- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).
- ibmvnic fix NULL tx_pools and rx_tools issue at do_reset (bsc#1175873 ltc#187922).
- include/linux/poison.h: remove obsolete comment (git fixes (poison)).
- Input: psmouse - add a newline when printing 'proto' by sysfs (git-fixes).
- Input: sentelic - fix error return when fsp_reg_write fails (bsc#1111666).
- integrity: remove redundant initialization of variable ret (git-fixes).
- io-mapping: indicate mapping failure (git-fixes).
- ip6_gre: fix null-ptr-deref in ip6gre_init_net() (git-fixes).
- ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() (networking-stable-20_06_28).
- ip6_tunnel: allow not to count pkts on tstats by passing dev as NULL (bsc#1175515).
- ip_tunnel: allow not to count pkts on tstats by setting skb's dev to NULL (bsc#1175515).
- ip_tunnel: Emit events for post-register MTU changes (git-fixes).
- ip_tunnel: fix use-after-free in ip_tunnel_lookup() (networking-stable-20_06_28).
- ip_tunnel: restore binding to ifaces with a large mtu (git-fixes).
- ipv4: fill fl4_icmp_{type,code} in ping_v4_sendmsg (networking-stable-20_07_17).
- ipv4: Silence suspicious RCU usage warning (git-fixes).
- ipv6: fix memory leaks on IPV6_ADDRFORM path (git-fixes).
- ipvlan: fix device features (git-fixes).
- ipvs: allow connection reuse for unconfirmed conntrack (git-fixes).
- ipvs: fix refcount usage for conns in ops mode (git-fixes).
- ipvs: fix the connection sync failed in some cases (bsc#1174699).
- irqchip/gic: Atomically update affinity (bsc#1111666).
- iwlegacy: Check the return value of pcie_capability_read_*() (bsc#1111666).
- jbd2: add the missing unlock_buffer() in the error path of jbd2_write_superblock() (bsc#1175772).
- kabi: genetlink: remove genl_bind (kabi).
- kabi: hide new parameter of ip6_dst_lookup_flow() (bsc#1165629).
- kabi: mask changes to struct ipv6_stub (bsc#1165629).
- kernel/cpu_pm: Fix uninitted local in cpu_pm (git fixes (kernel/pm)).
- kernel-docs: Change Requires on python-Sphinx to earlier than version 3 References: bsc#1166965 From 3 on the internal API that the build system uses was rewritten in an incompatible way. See https://github.com/sphinx-doc/sphinx/issues/7421 and https://bugzilla.suse.com/show_bug.cgi?id=1166965#c16 for some details.
- kernel/relay.c: fix memleak on destroy relay channel (git-fixes).
- kernfs: do not call fsnotify() with name without a parent (bsc#1175770).
- KVM: arm64: Ensure 'params' is initialised when looking up sys register (bsc#1133021).
- KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART (bsc#1133021).
- KVM: arm/arm64: Fix young bit from mmu notifier (bsc#1133021).
- KVM: arm/arm64: vgic: Do not rely on the wrong pending table (bsc#1133021).
- KVM: arm/arm64: vgic-its: Fix restoration of unmapped collections (bsc#1133021).
- KVM: arm: Fix DFSR setting for non-LPAE aarch32 guests (bsc#1133021).
- KVM: arm: Make inject_abt32() inject an external abort instead (bsc#1133021).
- kvm: Change offset in kvm_write_guest_offset_cached to unsigned (bsc#1133021).
- KVM: Check for a bad hva before dropping into the ghc slow path (bsc#1133021).
- KVM: PPC: Book3S PR: Remove uninitialized_var() usage (bsc#1065729).
- l2tp: remove skb_dst_set() from l2tp_xmit_skb() (networking-stable-20_07_17).
- leds: 88pm860x: fix use-after-free on unbind (git-fixes).
- leds: core: Flush scheduled work for system suspend (git-fixes).
- leds: da903x: fix use-after-free on unbind (git-fixes).
- leds: lm3533: fix use-after-free on unbind (git-fixes).
- leds: lm355x: avoid enum conversion warning (git-fixes).
- leds: wm831x-status: fix use-after-free on unbind (git-fixes).
- lib/dim: Fix -Wunused-const-variable warnings (bsc#1174852).
- lib: dimlib: fix help text typos (bsc#1174852).
- lib: logic_pio: Add logic_pio_unregister_range() (bsc#1174658).
- lib: logic_pio: Avoid possible overlap for unregistering regions (bsc#1174658).
- lib: logic_pio: Fix RCU usage (bsc#1174658).
- linux/dim: Add completions count to dim_sample (bsc#1174852).
- linux/dim: Fix overflow in dim calculation (bsc#1174852).
- linux/dim: Move implementation to .c files (bsc#1174852).
- linux/dim: Move logic to dim.h (bsc#1174852).
- linux/dim: Remove 'net' prefix from internal DIM members (bsc#1174852).
- linux/dim: Rename externally exposed macros (bsc#1174852).
- linux/dim: Rename externally used net_dim members (bsc#1174852).
- linux/dim: Rename net_dim_sample() to net_dim_update_sample() (bsc#1174852).
- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).
- llc: make sure applications use ARPHRD_ETHER (networking-stable-20_07_17).
- mac80211: mesh: Free ie data when leaving mesh (git-fixes).
- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).
- MAINTAINERS: add entry for Dynamic Interrupt Moderation (bsc#1174852).
- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (git-fixes).
- md/raid5: Fix Force reconstruct-write io stuck in degraded raid5 (git-fixes).
- media: budget-core: Improve exception handling in budget_register() (git-fixes).
- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).
- media: firewire: Using uninitialized values in node_probe() (git-fixes).
- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).
- media: vpss: clean up resources in init (git-fixes).
- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).
- mfd: dln2: Run event handler loop under spinlock (git-fixes).
- mfd: rk808: Fix RK818 ID template (bsc#1175412).
- mld: fix memory leak in ipv6_mc_destroy_dev() (networking-stable-20_06_28).
- mm: filemap: clear idle flag for writes (bsc#1175769).
- mm/migrate.c: add missing flush_dcache_page for non-mapped page migrate (git fixes (mm/migrate)).
- mm/mmu_notifier: use hlist_add_head_rcu() (git fixes (mm/mmu_notifiers)).
- mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() (git fixes (mm/compaction)).
- mm/rmap.c: do not reuse anon_vma if we just want a copy (git fixes (mm/rmap)).
- mm/shmem.c: cast the type of unmap_start to u64 (git fixes (mm/shmem)).
- mm, thp: fix defrag setting if newline is not used (git fixes (mm/thp)).
- mm/vunmap: add cond_resched() in vunmap_pmd_range (bsc#1175654 ltc#184617).
- mtd: spi-nor: Fix an error code in spi_nor_read_raw() (bsc#1175413).
- mtd: spi-nor: fix kernel-doc for spi_nor::info (bsc#1175414).
- mtd: spi-nor: fix kernel-doc for spi_nor::reg_proto (bsc#1175415).
- mtd: spi-nor: fix silent truncation in spi_nor_read_raw() (bsc#1175416).
- mwifiex: Prevent memory corruption handling keys (git-fixes).
- net: Added pointer check for dst->ops->neigh_lookup in dst_neigh_lookup_skb (git-fixes).
- net: bridge: enfore alignment for ethernet address (networking-stable-20_06_28).
- net: core: reduce recursion limit value (networking-stable-20_06_28).
- net: Do not clear the sock TX queue in sk_set_socket() (networking-stable-20_06_28).
- net: dsa: b53: check for timeout (git-fixes).
- net: ena: Add first_interrupt field to napi struct (bsc#1174852).
- net: ena: add reserved PCI device ID (bsc#1174852).
- net: ena: add support for reporting of packet drops (bsc#1174852).
- net: ena: add support for the rx offset feature (bsc#1174852).
- net: ena: add support for traffic mirroring (bsc#1174852).
- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).
- net: ena: allow setting the hash function without changing the key (bsc#1174852).
- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).
- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).
- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).
- net: ena: change num_queues to num_io_queues for clarity and consistency (bsc#1174852).
- net: ena: changes to RSS hash key allocation (bsc#1174852).
- net: ena: Change WARN_ON expression in ena_del_napi_in_range() (bsc#1174852).
- net: ena: clean up indentation issue (bsc#1174852).
- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).
- net: ena: cosmetic: code reorderings (bsc#1174852).
- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).
- net: ena: cosmetic: fix line break issues (bsc#1174852).
- net: ena: cosmetic: fix spacing issues (bsc#1174852).
- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).
- net: ena: cosmetic: minor code changes (bsc#1174852).
- net: ena: cosmetic: remove unnecessary code (bsc#1174852).
- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).
- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).
- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).
- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).
- net: ena: drop superfluous prototype (bsc#1174852).
- net: ena: enable support of rss hash key and function changes (bsc#1174852).
- net: ena: enable the interrupt_moderation in driver_supported_features (bsc#1174852).
- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).
- net: ena: ethtool: get_channels: use combined only (bsc#1174852).
- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).
- net: ena: ethtool: support set_channels callback (bsc#1174852).
- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).
- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).
- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).
- net: ena: fix incorrect setting of the number of msix vectors (bsc#1174852).
- net: ena: fix incorrect update of intr_delay_resolution (bsc#1174852).
- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).
- net: ena: fix update of interrupt moderation register (bsc#1174852).
- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).
- net: ena: implement XDP drop support (bsc#1174852).
- net: ena: Implement XDP_TX action (bsc#1174852).
- net: ena: make ethtool -l show correct max number of queues (bsc#1174852).
- net: ena: Make missed_tx stat incremental (bsc#1083548).
- net: ena: Make some functions static (bsc#1174852).
- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).
- net: ena: multiple queue creation related cleanups (bsc#1174852).
- net: ena: Prevent reset after device destruction (bsc#1083548).
- net: ena: reduce driver load time (bsc#1174852).
- net: ena: remove all old adaptive rx interrupt moderation code from ena_com (bsc#1174852).
- net: ena: remove code duplication in ena_com_update_nonadaptive_moderation_interval _*() (bsc#1174852).
- net: ena: remove code that does nothing (bsc#1174852).
- net: ena: remove ena_restore_ethtool_params() and relevant fields (bsc#1174852).
- net: ena: remove old adaptive interrupt moderation code from ena_netdev (bsc#1174852).
- net: ena: remove redundant print of number of queues (bsc#1174852).
- net: ena: remove set but not used variable 'hash_key' (bsc#1174852).
- net: ena: remove set but not used variable 'rx_ring' (bsc#1174852).
- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).
- net: ena: Select DIMLIB for ENA_ETHERNET (bsc#1174852).
- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).
- net: ena: support new LLQ acceleration mode (bsc#1174852).
- net: ena: switch to dim algorithm for rx adaptive interrupt moderation (bsc#1174852).
- net: ena: use explicit variable size for clarity (bsc#1174852).
- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).
- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1174852).
- net: ena: xdp: XDP_TX: fix memory leak (bsc#1174852).
- net: ethernet: aquantia: Fix wrong return value (git-fixes).
- net: ethernet: broadcom: have drivers select DIMLIB as needed (bsc#1174852).
- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).
- net: fec: correct the error path for regulator disable in probe (git-fixes).
- netfilter: x_tables: add counters allocation wrapper (git-fixes).
- netfilter: x_tables: cap allocations at 512 mbyte (git-fixes).
- netfilter: x_tables: limit allocation requests for blob rule heads (git-fixes).
- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)
- net: fix memleak in register_netdevice() (networking-stable-20_06_28).
- net: Fix the arp error in some cases (networking-stable-20_06_28).
- net: gre: recompute gre csum for sctp over gre tunnels (git-fixes).
- net: hns3: add autoneg and change speed support for fibre port (bsc#1174070).
- net: hns3: add support for FEC encoding control (bsc#1174070).
- net: hns3: add support for multiple media type (bsc#1174070).
- net: hns3: fix a not link up issue when fibre port supports autoneg (bsc#1174070).
- net: hns3: fix for FEC configuration (bsc#1174070).
- net: hns3: fix port capbility updating issue (bsc#1174070).
- net: hns3: fix port setting handle for fibre port (bsc#1174070).
- net: hns3: fix selftest fail issue for fibre port with autoneg on (bsc#1174070).
- net: hns3: restore the MAC autoneg state after reset (bsc#1174070).
- net: increment xmit_recursion level in dev_direct_xmit() (networking-stable-20_06_28).
- net: ip6_gre: Request headroom in __gre6_xmit() (git-fixes).
- net: lan78xx: add missing endpoint sanity check (git-fixes).
- net: lan78xx: fix transfer-buffer memory leak (git-fixes).
- net: make symbol 'flush_works' static (git-fixes).
- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).
- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).
- net: netsec: Fix signedness bug in netsec_probe() (bsc#1175417).
- net: netsec: initialize tx ring on ndo_open (bsc#1175418).
- net: phy: Check harder for errors in get_phy_id() (bsc#1111666).
- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).
- net: Set fput_needed iff FDPUT_FPUT is set (git-fixes).
- net: socionext: Fix a signedness bug in ave_probe() (bsc#1175419).
- net: socionext: replace napi_alloc_frag with the netdev variant on init (bsc#1175420).
- net: spider_net: Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- net: stmmac: dwmac1000: provide multicast filter fallback (git-fixes).
- net: stmmac: Fix RX packet size > 8191 (git-fixes).
- net: udp: Fix wrong clean up for IS_UDPLITE macro (git-fixes).
- net: update net_dim documentation after rename (bsc#1174852).
- net: usb: ax88179_178a: fix packet alignment padding (networking-stable-20_06_28).
- net: usb: qmi_wwan: add support for Quectel EG95 LTE modem (networking-stable-20_07_17).
- netvsc: unshare skb in VF rx handler (git-fixes).
- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).
- NTB: Fix an error in get link status (git-fixes).
- ntb_netdev: fix sleep time mismatch (git-fixes).
- NTB: ntb_transport: Use scnprintf() for avoiding potential buffer overflow (git-fixes).
- nvme: fix possible deadlock when I/O is blocked (git-fixes).
- nvme-multipath: do not fall back to __nvme_find_path() for non-optimized paths (bsc#1172108).
- nvme-multipath: fix logic for non-optimized paths (bsc#1172108).
- nvme-multipath: round-robin: eliminate 'fallback' variable (bsc#1172108).
- nvme: multipath: round-robin: fix single non-optimized path case (bsc#1172108).
- obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).
- ocfs2: add trimfs dlm lock resource (bsc#1175228).
- ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: change slot number type s16 to u16 (bsc#1175786).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: fix remounting needed after setfacl command (bsc#1173954).
- ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).
- ocfs2: fix value of OCFS2_INVALID_SLOT (bsc#1175767).
- ocfs2: load global_inode_alloc (bsc#1172963).
- ocfs2: load global_inode_alloc (bsc#1172963).
- omapfb: dss: Fix max fclk divider for omap36xx (bsc#1113956)
- openvswitch: Prevent kernel-infoleak in ovs_ct_put_key() (git-fixes).
- PCI/ASPM: Add missing newline in sysfs 'policy' (git-fixes).
- PCI: dwc: Move interrupt acking into the proper callback (bsc#1175666).
- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).
- PCI: Fix 'try' semantics of bus and slot reset (git-fixes).
- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).
- PCI: hv: Fix a timing issue which causes kdump to fail occasionally (bsc#1172871, bsc#1172872, git-fixes).
- PCI: Release IVRS table in AMD ACS quirk (git-fixes).
- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).
- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).
- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).
- pinctrl: single: fix function name in documentation (git-fixes).
- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).
- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).
- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).
- PM / CPU: replace raw_notifier with atomic_notifier (git fixes (kernel/pm)).
- PM / devfreq: rk3399_dmc: Add missing of_node_put() (bsc#1175668).
- PM / devfreq: rk3399_dmc: Disable devfreq-event device when fails.
- PM / devfreq: rk3399_dmc: Fix kernel oops when rockchip,pmu is absent (bsc#1175668).
- PM: sleep: core: Fix the handling of pending runtime resume requests (git-fixes).
- powerpc/64s: Do not init FSCR_DSCR in __init_FSCR() (bsc#1065729).
- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).
- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).
- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).
- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).
- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).
- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).
- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).
- powerpc/perf: Fix missing is_sier_aviable() during build (bsc#1065729).
- powerpc/pseries: Do not initiate shutdown when system is running on UPS (bsc#1175440 ltc#187574).
- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).
- powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU death (bsc#1085030 ltC#165630).
- powerpc/pseries: PCIE PHB reset (bsc#1174689).
- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).
- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).
- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).
- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).
- propagate_one(): mnt_set_mountpoint() needs mount_lock (bsc#1174841).
- pseries: Fix 64 bit logical memory block panic (bsc#1065729).
- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).
- rds: Prevent kernel-infoleak in rds_notify_queue_get() (git-fixes).
- Revert 'ALSA: hda: call runtime_allow() for all hda controllers' (bsc#1111666).
- Revert 'drm/amdgpu: Fix NULL dereference in dpm sysfs handlers' (bsc#1113956) * refresh for context changes
- Revert 'ocfs2: avoid inode removal while nfsd is accessing it' This reverts commit 9e096c72476eda333a9998ff464580c00ff59c83.
- Revert 'ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).' This reverts commit 0bf6e248f93736b3f17f399b4a8f64ffa30d371e.
- Revert 'ocfs2: load global_inode_alloc (bsc#1172963).' This reverts commit fc476497b53f967dc615b9cbad9427ba3107b5c4.
- Revert pciehp patches that broke booting (bsc#1174887)
- Revert 'scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe' (bsc#1171688 bsc#1174003).
- Revert 'scsi: qla2xxx: Fix crash on qla2x00_mailbox_command' (bsc#1171688 bsc#1174003).
- Revert 'xen/balloon: Fix crash when ballooning on x86 32 bit PAE' (bsc#1065600).
- rocker: fix incorrect error handling in dma_rings_init (networking-stable-20_06_28).
- rpm/check-for-config-changes: Ignore CONFIG_CC_VERSION_TEXT
- rpm/check-for-config-changes: Ignore CONFIG_LD_VERSION
- rpm/constraints.in: Increase memory for kernel-docs References: https://build.opensuse.org/request/show/792664
- rpm: drop execute permissions on source files Sometimes a source file with execute permission appears in upstream repository and makes it into our kernel-source packages. This is caught by OBS build checks and may even result in build failures. Sanitize the source tree by removing execute permissions from all C source and header files.
- rpm/kabi.pl: account for namespace field being moved last Upstream is moving the namespace field in Module.symvers last in order to preserve backwards compatibility with kmod tools (depmod, etc). Fix the kabi.pl script to expect the namespace field last. Since split() ignores trailing empty fields and delimeters, switch to using tr to count how many fields/tabs are in a line. Also, in load_symvers(), pass LIMIT of -1 to split() so it does not strip trailing empty fields, as namespace is an optional field.
- rpm/kernel-binary.spec.in: do not run klp-symbols for configs with no modules Starting with 5.8-rc1, s390x/zfcpdump builds fail because rpm/klp-symbols script does not find .tmp_versions directory. This is missing because s390x/zfcpdump is built without modules (CONFIG_MODULES disabled). As livepatching cannot work without modules, the cleanest solution is setting %klp_symbols to 0 if CONFIG_MODULES is disabled. (We cannot simply add another condition to the place where %klp_symbols is set as it can be already set to 1 from prjconf.)
- rpm/kernel-binary.spec.in: restrict livepatch metapackage to default flavor It has been reported that the kernel-*-livepatch metapackage got erroneously enabled for SLE15-SP3's new -preempt flavor, leading to a unresolvable dependency to a non-existing kernel-livepatch-x.y.z-preempt package. As SLE12 and SLE12-SP1 have run out of livepatching support, the need to build said metapackage for the -xen flavor is gone and the only remaining flavor for which they're still wanted is -default. Restrict the build of the kernel-*-livepatch metapackage to the -default flavor.
- rpm/kernel-obs-build.spec.in: add dm-crypt for building with cryptsetup Co-Authored-By: Adam Spiers <aspiers@suse.com>
- rpm/kernel-obs-build.spec.in: Enable overlayfs Overlayfs is needed for podman or docker builds when no more specific driver can be used (like lvm or btrfs). As the default build fs is ext4 currently, we need overlayfs kernel modules to be available.
- rpm/kernel-source.spec.in: Add obsolete_rebuilds (boo#1172073).
- rpm/mkspec-dtb: add mt76 based dtb package
- rpm/package-descriptions: garbege collection remove old ARM and Xen flavors.
- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).
- s390, dcssblk: kaddr and pfn can be NULL to ->direct_access() (bsc#1174873).
- sched: consistently handle layer3 header accesses in the presence of VLANs (networking-stable-20_07_17).
- scripts/git_sort/git_sort.py: add bluetooth/bluetooth-next.git repository
- scsi: dh: Add Fujitsu device to devinfo and dh lists (bsc#1174026).
- scsi: Fix trivial spelling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Address a set of sparse warnings (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change {RD,WRT}_REG_*() function names from upper case into lower case (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in header files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in source files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix issue with adapter's stopping state (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix login timeout (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix null pointer access during disconnect from subsystem (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix spelling of a variable name (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix warning after FC target reset (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush all sessions on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush I/O on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Initialize 'n' before using it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce noisy debug message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove an unused function (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove a superfluous cast (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: SAN congestion management implementation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use register names instead of register offsets (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for ha->fw_dumped (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1171688 bsc#1174003).
- scsi: smartpqi: add bay identifier (bsc#1172418).
- scsi: smartpqi: add gigabyte controller (bsc#1172418).
- scsi: smartpqi: add id support for SmartRAID 3152-8i (bsc#1172418).
- scsi: smartpqi: add inquiry timeouts (bsc#1172418).
- scsi: smartpqi: add module param for exposure order (bsc#1172418).
- scsi: smartpqi: add module param to hide vsep (bsc#1172418).
- scsi: smartpqi: add new pci ids (bsc#1172418).
- scsi: smartpqi: add pci ids for fiberhome controller (bsc#1172418).
- scsi: smartpqi: add RAID bypass counter (bsc#1172418).
- scsi: smartpqi: add sysfs entries (bsc#1172418).
- scsi: smartpqi: Align driver syntax with oob (bsc#1172418).
- scsi: smartpqi: avoid crashing kernel for controller issues (bsc#1172418).
- scsi: smartpqi: bump version (bsc#1172418).
- scsi: smartpqi: bump version (bsc#1172418).
- scsi: smartpqi: bump version to 1.2.16-010 (bsc#1172418).
- scsi: smartpqi: change TMF timeout from 60 to 30 seconds (bsc#1172418).
- scsi: smartpqi: correct hang when deleting 32 lds (bsc#1172418).
- scsi: smartpqi: correct REGNEWD return status (bsc#1172418).
- scsi: smartpqi: correct syntax issue (bsc#1172418).
- scsi: smartpqi: fix call trace in device discovery (bsc#1172418).
- scsi: smartpqi: fix controller lockup observed during force reboot (bsc#1172418).
- scsi: smartpqi: fix LUN reset when fw bkgnd thread is hung (bsc#1172418).
- scsi: smartpqi: fix problem with unique ID for physical device (bsc#1172418).
- scsi: smartpqi: identify physical devices without issuing INQUIRY (bsc#1172418).
- scsi: smartpqi: properly set both the DMA mask and the coherent DMA mask (bsc#1172418).
- scsi: smartpqi: remove unused manifest constants (bsc#1172418).
- scsi: smartpqi: Reporting unhandled SCSI errors (bsc#1172418).
- scsi: smartpqi: support device deletion via sysfs (bsc#1172418).
- scsi: smartpqi: update copyright (bsc#1172418).
- scsi: smartpqi: update logical volume size after expansion (bsc#1172418).
- scsi: smartpqi: Use scnprintf() for avoiding potential buffer overflow (bsc#1172418).
- scsi: storvsc: Correctly set number of hardware queues for IDE disk (git-fixes).
- scsi: target/iblock: fix WRITE SAME zeroing (bsc#1169790).
- sctp: Do not advertise IPv4 addresses if ipv6only is set on the socket (networking-stable-20_06_28).
- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).
- serial: 8250: change lock order in serial8250_do_startup() (git-fixes).
- serial: pl011: Do not leak amba_ports entry on driver register error (git-fixes).
- serial: pl011: Fix oops on -EPROBE_DEFER (git-fixes).
- Set VIRTIO_CONSOLE=y (bsc#1175667).
- sign also s390x kernel images (bsc#1163524)
- soc: fsl: qbman: allow registering a device link for the portal user (bsc#1174550).
- soc: fsl: qbman_portals: add APIs to retrieve the probing status (bsc#1174550).
- spi: davinci: Remove uninitialized_var() usage (git-fixes).
- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).
- spi: nxp-fspi: Ensure width is respected in spi-mem operations (bsc#1175421).
- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1175422).
- spi: spi-mem: export spi_mem_default_supports_op() (bsc#1175421).
- staging: fsl-dpaa2: ethsw: Add missing netdevice check (bsc#1175423).
- tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT (networking-stable-20_06_28).
- tcp: grow window for OOO packets only for SACK flows (networking-stable-20_06_28).
- tcp: make sure listeners do not initialize congestion-control state (networking-stable-20_07_17).
- tcp: md5: add missing memory barriers in tcp_md5_do_add()/tcp_md5_hash_key() (networking-stable-20_07_17).
- tcp: md5: do not send silly options in SYNCOOKIES (networking-stable-20_07_17).
- tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key() barriers (networking-stable-20_07_17).
- tracepoint: Mark __tracepoint_string's __used (git-fixes).
- tracing: Use trace_sched_process_free() instead of exit() for pid tracing (git-fixes).
- tty: serial: fsl_lpuart: add imx8qxp support (bsc#1175670).
- tty: serial: fsl_lpuart: free IDs allocated by IDA (bsc#1175670).
- Update patch reference for a tipc fix patch (bsc#1175515)
- USB: cdc-acm: rework notification_buffer resizing (git-fixes).
- USB: gadget: f_tcm: Fix some resource leaks in some error paths (git-fixes).
- USB: host: ohci-exynos: Fix error handling in exynos_ohci_probe() (git-fixes).
- USB: Ignore UAS for JMicron JMS567 ATA/ATAPI Bridge (git-fixes).
- USB: iowarrior: fix up report size handling for some devices (git-fixes).
- usbip: tools: fix module name in man page (git-fixes).
- USB: rename USB quirk to USB_QUIRK_ENDPOINT_IGNORE (git-fixes).
- USB: serial: cp210x: enable USB generic throttle/unthrottle (git-fixes).
- USB: serial: cp210x: re-enable auto-RTS on open (git-fixes).
- USB: serial: ftdi_sio: clean up receive processing (git-fixes).
- USB: serial: ftdi_sio: fix break and sysrq handling (git-fixes).
- USB: serial: ftdi_sio: make process-packet buffer unsigned (git-fixes).
- USB: serial: iuu_phoenix: fix led-activity helpers (git-fixes).
- USB: serial: qcserial: add EM7305 QDL product ID (git-fixes).
- USB: xhci: define IDs for various ASMedia host controllers (git-fixes).
- USB: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).
- USB: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).
- USB: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).
- VFS: Check rename_lock in lookup_fast() (bsc#1174734).
- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).
- video: pxafb: Fix the function used to balance a 'dma_alloc_coherent()' call (git-fixes).
- vlan: consolidate VLAN parsing code and limit max parsing depth (networking-stable-20_07_17).
- vmxnet3: use correct tcp hdr length when packet is encapsulated (bsc#1175199).
- vt_compat_ioctl(): clean up, use compat_ptr() properly (git-fixes).
- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).
- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (bsc#1111666).
- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (bsc#1111666).
- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (bsc#1111666).
- wl1251: fix always return 0 error (git-fixes).
- x86/hyperv: Create and use Hyper-V page definitions (git-fixes).
- x86/hyper-v: Fix overflow bug in fill_gva_list() (git-fixes).
- x86/hyperv: Make hv_vcpu_is_preempted() visible (git-fixes).
- xen/balloon: fix accounting in alloc_xenballooned_pages error path (bsc#1065600).
- xen/balloon: make the balloon wait interruptible (bsc#1065600).
- xfrm: check id proto in validate_tmpl() (git-fixes).
- xfrm: clean up xfrm protocol checks (git-fixes).
- xfrm_user: uncoditionally validate esn replay attribute struct (git-fixes).
- xfs: fix inode allocation block res calculation precedence (git-fixes).
- xfs: fix reflink quota reservation accounting error (git-fixes).
- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).
Patchnames
SUSE-2020-2541,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2541
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP1 Azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup (bsc#1165629).\n- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).\n- CVE-2020-14356: Fixed a null pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213).\n- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).\n- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).\n- CVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).\n- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication Bluetooth might have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access (bsc#1171988).\n\nThe following non-security bugs were fixed:\n\n- ACPI: kABI fixes for subsys exports (bsc#1174968).\n- ACPI / LPSS: Resume BYT/CHT I2C controllers from resume_noirq (bsc#1174968).\n- ACPI / LPSS: Use acpi_lpss_* instead of acpi_subsys_* functions for hibernate (bsc#1174968).\n- ACPI: PM: Introduce \u0027poweroff\u0027 callbacks for ACPI PM domain and LPSS (bsc#1174968).\n- ACPI: PM: Simplify and fix PM domain hibernation callbacks (bsc#1174968).\n- af_key: pfkey_dump needs parameter validation (git-fixes).\n- agp/intel: Fix a memory leak on module initialisation failure (git-fixes).\n- ALSA: core: pcm_iec958: fix kernel-doc (bsc#1111666).\n- ALSA: echoaduio: Drop superfluous volatile modifier (bsc#1111666).\n- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (bsc#1111666).\n- ALSA: hda: Add support for Loongson 7A1000 controller (bsc#1111666).\n- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (bsc#1111666).\n- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (bsc#1111666).\n- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (bsc#1111666).\n- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).\n- ALSA: hda: fix snd_hda_codec_cleanup() documentation (bsc#1111666).\n- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (bsc#1111666).\n- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (bsc#1111666).\n- ALSA: hda/realtek: Add model alc298-samsung-headphone (git-fixes).\n- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for Lenovo Carbon X1 8th gen (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for MSI GL63 (bsc#1111666).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex Book (git-fixes).\n- ALSA: hda/realtek - change to suitable link model for ASUS platform (bsc#1111666).\n- ALSA: hda/realtek - Check headset type by unplug and resume (bsc#1111666).\n- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (bsc#1111666).\n- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (bsc#1111666).\n- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (bsc#1111666).\n- ALSA: hda/realtek: Fix add a \u0027ultra_low_power\u0027 function for intel reference board (alc256) (bsc#1111666).\n- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (bsc#1111666).\n- ALSA: hda/realtek - Fixed HP right speaker no sound (bsc#1111666).\n- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (bsc#1111666).\n- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (bsc#1111666).\n- ALSA: hda/realtek - Fix unused variable warning (bsc#1111666).\n- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (bsc#1111666).\n- ALSA: hda - reverse the setting value in the micmute_led_set (bsc#1111666).\n- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).\n- ALSA: pci: delete repeated words in comments (bsc#1111666).\n- ALSA: seq: oss: Serialize ioctls (bsc#1111666).\n- ALSA: usb-audio: Add capture support for Saffire 6 (USB 1.1) (git-fixes).\n- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (bsc#1111666).\n- ALSA: usb-audio: add startech usb audio dock name (bsc#1111666).\n- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (bsc#1111666).\n- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (bsc#1111666).\n- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (bsc#1111666).\n- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (bsc#1111666).\n- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).\n- ALSA: usb-audio: fix spelling mistake \u0027buss\u0027 -\u003e \u0027bus\u0027 (bsc#1111666).\n- ALSA: usb-audio: ignore broken processing/extension unit (git-fixes).\n- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (bsc#1111666).\n- ALSA: usb/line6: remove \u0027defined but not used\u0027 warning (bsc#1111666).\n- arm64: Add MIDR encoding for HiSilicon Taishan CPUs (bsc#1174547).\n- arm64: Add MIDR encoding for NVIDIA CPUs (bsc#1174547).\n- arm64: add sysfs vulnerability show for meltdown (bsc#1174547).\n- arm64: Add sysfs vulnerability show for spectre-v1 (bsc#1174547).\n- arm64: add sysfs vulnerability show for spectre-v2 (bsc#1174547).\n- arm64: add sysfs vulnerability show for speculative store bypass (bsc#1174547). \n- arm64: Advertise mitigation of Spectre-v2, or lack thereof (bsc#1174547). \n- arm64: Always enable spectre-v2 vulnerability detection (bsc#1174547). \n- arm64: Always enable ssb vulnerability detection (bsc#1174547). \n- arm64: backtrace: Do not bother trying to unwind the userspace stack (bsc#1175397).\n- arm64: capabilities: Add NVIDIA Denver CPU to bp_harden list (bsc#1174547).\n- arm64: capabilities: Merge duplicate Cavium erratum entries (bsc#1174547).\n- arm64: capabilities: Merge entries for ARM64_WORKAROUND_CLEAN_CACHE (bsc#1174547). \n- arm64: cpufeature: Enable Qualcomm Falkor/Kryo errata 1003 (bsc#1175398).\n- arm64: Do not mask out PTE_RDONLY in pte_same() (bsc#1175393).\n- arm64: enable generic CPU vulnerabilites support (bsc#1174547). Update config/arm64/default\n- arm64: Ensure VM_WRITE|VM_SHARED ptes are clean by default (bsc#1175394).\n- arm64: errata: Do not define type field twice for arm64_errata entries (bsc#1174547).\n- arm64: errata: Update stale comment (bsc#1174547).\n- arm64: Get rid of __smccc_workaround_1_hvc_* (bsc#1174547).\n- arm64: kpti: Avoid rewriting early page tables when KASLR is enabled (bsc#1174547).\n- arm64: kpti: Update arm64_kernel_use_ng_mappings() when forced on (bsc#1174547).\n- arm64: kpti: Whitelist Cortex-A CPUs that do not implement the CSV3 field (bsc#1174547).\n- arm64: kpti: Whitelist HiSilicon Taishan v110 CPUs (bsc#1174547).\n- arm64: KVM: Avoid setting the upper 32 bits of VTCR_EL2 to 1 (bsc#1133021).\n- arm64: KVM: Guests can skip __install_bp_hardening_cb()s HYP work (bsc#1174547).\n- arm64: KVM: Use SMCCC_ARCH_WORKAROUND_1 for Falkor BP hardening (bsc#1174547). \n- arm64: mm: Fix pte_mkclean, pte_mkdirty semantics (bsc#1175526). \n- arm64: Provide a command line to disable spectre_v2 mitigation (bsc#1174547).\n- arm64: Silence clang warning on mismatched value/register sizes (bsc#1175396).\n- arm64/speculation: Support \u0027mitigations=\u0027 cmdline option (bsc#1174547). \n- arm64: ssbd: explicitly depend on \u003clinux/prctl.h\u003e (bsc#1175399).\n- arm64: ssbs: Do not treat CPUs with SSBS as unaffected by SSB (bsc#1174547).\n- arm64: ssbs: Fix context-switch when SSBS is present on all CPUs (bsc#1175669).\n- arm64/sve: Fix wrong free for task-\u003ethread.sve_state (bsc#1175400).\n- arm64/sve: \u003cuapi/asm/ptrace.h\u003e should not depend on \u003cuapi/linux/prctl.h\u003e (bsc#1175401).\n- arm64: tlbflush: avoid writing RES0 bits (bsc#1175402).\n- arm64: Use firmware to detect CPUs that are not affected by Spectre-v2 (bsc#1174547).\n- ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17 (bsc#1133021). \n- ARM: KVM: invalidate icache on guest exit for Cortex-A15 (bsc#1133021).\n- ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15 (bsc#1133021).\n- ASoC: hda/tegra: Set buffer alignment to 128 bytes (bsc#1111666).\n- ASoC: intel: Fix memleak in sst_media_open (git-fixes).\n- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).\n- AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).\n- AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).\n- AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).\n- ax88172a: fix ax88172a_unbind() failures (git-fixes).\n- b43: Remove uninitialized_var() usage (git-fixes).\n- bcache: allocate meta data pages as compound pages (bsc#1172873).\n- block: check queue\u0027s limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).\n- block: Fix use-after-free in blkdev_get() (bsc#1174843).\n- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).\n- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (bsc#1111666).\n- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (bsc#1111666).\n- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (bsc#1111666).\n- bonding: fix active-backup failover for current ARP slave (bsc#1174771).\n- bonding: fix a potential double-unregister (git-fixes).\n- bonding: show saner speed for broadcast mode (git-fixes).\n- bpf: Fix map leak in HASH_OF_MAPS map (git-fixes).\n- brcmfmac: keep SDIO watchdog running when console_interval is non-zero (bsc#1111666).\n- brcmfmac: set state of hanger slot to FREE when flushing PSQ (bsc#1111666).\n- brcmfmac: To fix Bss Info flag definition Bug (bsc#1111666).\n- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).\n- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).\n- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).\n- btrfs: fix block group leak when removing fails (bsc#1175149).\n- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).\n- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).\n- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).\n- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).\n- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).\n- btrfs: fix memory leaks after failure to lookup checksums during inode logging (bsc#1175550).\n- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).\n- btrfs: fix race between block group removal and block group creation (bsc#1175149).\n- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).\n- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).\n- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).\n- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).\n- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).\n- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).\n- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).\n- btrfs: Open code btrfs_write_and_wait_marked_extents (bsc#1175149).\n- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).\n- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).\n- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).\n- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).\n- btrfs: Rename and export clear_btree_io_tree (bsc#1175149).\n- btrfs: treat RWF_{,D}SYNC writes as sync for CRCs (bsc#1175493).\n- bus: hisi_lpc: Add .remove method to avoid driver unbind crash (bsc#1174658).\n- bus: hisi_lpc: Do not fail probe for unrecognised child devices (bsc#1174658).\n- bus: hisi_lpc: Unregister logical PIO range to avoid potential use-after-free (bsc#1174658).\n- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).\n- cfg80211: check vendor command doit pointer before use (git-fixes).\n- char: virtio: Select VIRTIO from VIRTIO_CONSOLE (bsc#1175667).\n- cifs: document and cleanup dfs mount (bsc#1144333 bsc#1172428).\n- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1144333 bsc#1172428).\n- cifs: fix double free error on share and prefix (bsc#1144333 bsc#1172428).\n- cifs: handle empty list of targets in cifs_reconnect() (bsc#1144333 bsc#1172428).\n- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1144333 bsc#1172428).\n- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1144333 bsc#1172428).\n- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1144333 bsc#1172428).\n- cifs: reduce number of referral requests in DFS link lookups (bsc#1144333 bsc#1172428).\n- cifs: rename reconn_inval_dfs_target() (bsc#1144333 bsc#1172428).\n- clk: at91: clk-generated: check best_rate against ranges (bsc#1111666).\n- clk: clk-atlas6: fix return value check in atlas6_clk_init() (bsc#1111666).\n- clk: iproc: round clock rate to the closest (bsc#1111666).\n- clk: spear: Remove uninitialized_var() usage (git-fixes).\n- clk: st: Remove uninitialized_var() usage (git-fixes).\n- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1174549\n- console: newport_con: fix an issue about leak related system resources (git-fixes).\n- constrants: fix malformed XML Closing tag of an element is \u0027\u003c/foo\u003e\u0027, not \u0027\u003cfoo/\u003e\u0027. Fixes: 8b37de2eb835 (\u0027rpm/constraints.in: Increase memory for kernel-docs\u0027)\n- Created new preempt kernel flavor (jsc#SLE-11309) Configs are cloned from the respective $arch/default configs. All changed configs appart from CONFIG_PREEMPT-\u003ey are a result of dependencies, namely many lock/unlock primitives are no longer inlined in the preempt kernel. TREE_RCU has been also changed to PREEMPT_RCU which is the default implementation for PREEMPT kernel.\n- crypto: ccp - Fix use of merged scatterlists (git-fixes).\n- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).\n- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).\n- crypto: rockchip - fix scatterlist nents error (git-fixes).\n- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).\n- crypto: talitos - check AES key size (git-fixes).\n- crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK (git-fixes).\n- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- dev: Defer free of skbs in flush_backlog (git-fixes).\n- device property: Fix the secondary firmware node handling in set_primary_fwnode() (git-fixes).\n- devres: keep both device name and resource name in pretty name (git-fixes).\n- dlm: Fix kobject memleak (bsc#1175768).\n- dlm: remove BUG() before panic() (bsc#1174844).\n- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).\n- Documentation/networking: Add net DIM documentation (bsc#1174852).\n- dpaa2-eth: Fix passing zero to \u0027PTR_ERR\u0027 warning (bsc#1175403).\n- dpaa2-eth: free already allocated channels on probe defer (bsc#1175404).\n- dpaa2-eth: prevent array underflow in update_cls_rule() (bsc#1175405).\n- dpaa_eth: add dropped frames to percpu ethtool stats (bsc#1174550).\n- dpaa_eth: add newline in dev_err() msg (bsc#1174550).\n- dpaa_eth: avoid timestamp read on error paths (bsc#1175406).\n- dpaa_eth: change DMA device (bsc#1174550).\n- dpaa_eth: cleanup skb_to_contig_fd() (bsc#1174550).\n- dpaa_eth: defer probing after qbman (bsc#1174550).\n- dpaa_eth: extend delays in ndo_stop (bsc#1174550).\n- dpaa_eth: fix DMA mapping leak (bsc#1174550).\n- dpaa_eth: Fix one possible memleak in dpaa_eth_probe (bsc#1174550).\n- dpaa_eth: FMan erratum A050385 workaround (bsc#1174550).\n- dpaa_eth: perform DMA unmapping before read (bsc#1175407).\n- dpaa_eth: register a device link for the qman portal used (bsc#1174550).\n- dpaa_eth: remove netdev_err() for user errors (bsc#1174550).\n- dpaa_eth: remove redundant code (bsc#1174550).\n- dpaa_eth: simplify variables used in dpaa_cleanup_tx_fd() (bsc#1174550).\n- dpaa_eth: use a page to store the SGT (bsc#1174550).\n- dpaa_eth: use fd information in dpaa_cleanup_tx_fd() (bsc#1174550).\n- dpaa_eth: use only one buffer pool per interface (bsc#1174550).\n- dpaa_eth: use page backed rx buffers (bsc#1174550).\n- driver core: Avoid binding drivers to dead devices (git-fixes).\n- Drivers: hv: balloon: Remove dependencies on guest page size (git-fixes).\n- Drivers: hv: vmbus: Fix virt_to_hvpfn() for X86_PAE (git-fixes).\n- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127, bsc#1175128).\n- Drivers: hv: vmbus: Remove the undesired put_cpu_ptr() in hv_synic_cleanup() (git-fixes).\n- drivers/perf: hisi: Fix typo in events attribute array (bsc#1175408).\n- drivers/perf: hisi: Fixup one DDRC PMU register offset (bsc#1175410).\n- drivers/perf: hisi: Fix wrong value for all counters enable (bsc#1175409).\n- drm: Added orientation quirk for ASUS tablet model T103HAF (bsc#1111666).\n- drm/amd/display: fix pow() crashing when given base 0 (git-fixes).\n- drm/amdgpu: avoid dereferencing a NULL pointer (bsc#1111666).\n- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (bsc#1111666).\n- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (bsc#1113956) \t* refresh for context changes\n- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).\n- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1113956)\n- drm/arm: fix unintentional integer overflow on left shift (git-fixes).\n- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1113956) \t* refreshed for context changes\n- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).\n- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1113956) \t* move drm_mipi_dbi.c -\u003e tinydrm/mipi-drm.c \t* refresh for context changes\n- drm/debugfs: fix plain echo to connector \u0027force\u0027 attribute (bsc#1111666).\n- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).\n- drm/etnaviv: fix ref count leak via pm_runtime_get_sync (bsc#1111666).\n- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (bsc#1112178) \t* updated names of get/put functions\n- drm: hold gem reference until object is no longer accessed (bsc#1113956)\n- drm/imx: fix use after free (git-fixes).\n- drm/imx: imx-ldb: Disable both channels for split mode in enc-\u003edisable() (git-fixes).\n- drm/imx: tve: fix regulator_disable error path (git-fixes).\n- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).\n- drm/msm/adreno: fix updating ring fence (git-fixes).\n- drm/msm: ratelimit crtc event overflow error (bsc#1111666).\n- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).\n- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).\n- drm/nouveau: fix multiple instances of reference count leaks (bsc#1111666).\n- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).\n- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).\n- drm/radeon: disable AGP by default (bsc#1111666).\n- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).\n- drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync (bsc#1111666).\n- drm/rockchip: fix VOP_WIN_GET macro (bsc#1175411).\n- drm/tilcdc: fix leak \u0026 null ref in panel_connector_get_modes (bsc#1111666).\n- drm/ttm/nouveau: do not call tt destroy callback on alloc failure (bsc#1175232).\n- drm/vmwgfx: Fix two list_for_each loop exit tests (bsc#1111666).\n- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (bsc#1111666).\n- drm/xen-front: Fix misused IS_ERR_OR_NULL checks (bsc#1065600).\n- efi/memreserve: deal with memreserve entries in unmapped memory (bsc#1174685).\n- ext4: check journal inode extents more carefully (bsc#1173485).\n- ext4: do not allow overlapping system zones (bsc#1173485).\n- ext4: fix checking of directory entry validity for inline directories (bsc#1175771).\n- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1174840).\n- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).\n- fat: do not allow to mount if the FAT length == 0 (bsc#1174845).\n- fbdev: Detect integer underflow at \u0027struct fbcon_ops\u0027-\u003eclear_margins. (bsc#1112178) \t* move files drivers/video/fbdev/core -\u003e drivers/video/console \t* refresh for context changes\n- firmware: google: check if size is valid when decoding VPD data (git-fixes).\n- firmware: google: increment VPD key_len properly (git-fixes).\n- fpga: dfl: fix bug in port reset handshake (git-fixes).\n- fsl/fman: add API to get the device behind a fman port (bsc#1174550).\n- fsl/fman: check dereferencing null pointer (git-fixes).\n- fsl/fman: detect FMan erratum A050385 (bsc#1174550).\n- fsl/fman: do not touch liodn base regs reserved on non-PAMU SoCs (bsc#1174550).\n- fsl/fman: fix dereference null return value (git-fixes).\n- fsl/fman: fix eth hash table allocation (git-fixes).\n- fsl/fman: fix unreachable code (git-fixes).\n- fsl/fman: remove unused struct member (bsc#1174550).\n- fsl/fman: use 32-bit unsigned integer (git-fixes).\n- fuse: fix memleak in cuse_channel_open (bsc#1174926).\n- fuse: fix missing unlock_page in fuse_writepage() (bsc#1174904).\n- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175062).\n- fuse: fix weird page warning (bsc#1175063).\n- fuse: flush dirty data/metadata before non-truncate setattr (bsc#1175064).\n- fuse: truncate pending writes on O_TRUNC (bsc#1175065).\n- fuse: verify attributes (bsc#1175066).\n- fuse: verify nlink (bsc#1175067).\n- genetlink: remove genl_bind (networking-stable-20_07_17).\n- go7007: add sanity checking for endpoints (git-fixes).\n- gpu: host1x: debug: Fix multiple channels emitting messages simultaneously (bsc#1111666).\n- HID: hiddev: fix mess in hiddev_open() (git-fixes).\n- HISI LPC: Re-Add ACPI child enumeration support (bsc#1174658).\n- HISI LPC: Stop using MFD APIs (bsc#1174658).\n- hv_balloon: Balloon up according to request page number (git-fixes).\n- hv_balloon: Use a static page for the balloon_up send buffer (git-fixes).\n- hv_netvsc: Allow scatter-gather feature to be tunable (git-fixes).\n- hv_netvsc: do not use VF device if link is down (git-fixes).\n- hv_netvsc: Fix a warning of suspicious RCU usage (git-fixes).\n- hv_netvsc: Fix error handling in netvsc_attach() (git-fixes).\n- hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (git-fixes).\n- hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (git-fixes).\n- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (git-fixes).\n- hv_netvsc: flag software created hash value (git-fixes).\n- hv_netvsc: Remove \u0027unlikely\u0027 from netvsc_select_queue (git-fixes).\n- i2c: rcar: in slave mode, clear NACK earlier (git-fixes).\n- i2c: rcar: slave: only send STOP event when we have been addressed (bsc#1111666).\n- i40e: Fix crash during removing i40e driver (git-fixes).\n- i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (git-fixes).\n- ibmveth: Fix use of ibmveth in a bridge (bsc#1174387 ltc#187506).\n- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).\n- ibmvnic fix NULL tx_pools and rx_tools issue at do_reset (bsc#1175873 ltc#187922).\n- include/linux/poison.h: remove obsolete comment (git fixes (poison)).\n- Input: psmouse - add a newline when printing \u0027proto\u0027 by sysfs (git-fixes).\n- Input: sentelic - fix error return when fsp_reg_write fails (bsc#1111666).\n- integrity: remove redundant initialization of variable ret (git-fixes).\n- io-mapping: indicate mapping failure (git-fixes).\n- ip6_gre: fix null-ptr-deref in ip6gre_init_net() (git-fixes).\n- ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() (networking-stable-20_06_28).\n- ip6_tunnel: allow not to count pkts on tstats by passing dev as NULL (bsc#1175515).\n- ip_tunnel: allow not to count pkts on tstats by setting skb\u0027s dev to NULL (bsc#1175515).\n- ip_tunnel: Emit events for post-register MTU changes (git-fixes).\n- ip_tunnel: fix use-after-free in ip_tunnel_lookup() (networking-stable-20_06_28).\n- ip_tunnel: restore binding to ifaces with a large mtu (git-fixes).\n- ipv4: fill fl4_icmp_{type,code} in ping_v4_sendmsg (networking-stable-20_07_17).\n- ipv4: Silence suspicious RCU usage warning (git-fixes).\n- ipv6: fix memory leaks on IPV6_ADDRFORM path (git-fixes).\n- ipvlan: fix device features (git-fixes).\n- ipvs: allow connection reuse for unconfirmed conntrack (git-fixes).\n- ipvs: fix refcount usage for conns in ops mode (git-fixes).\n- ipvs: fix the connection sync failed in some cases (bsc#1174699).\n- irqchip/gic: Atomically update affinity (bsc#1111666).\n- iwlegacy: Check the return value of pcie_capability_read_*() (bsc#1111666).\n- jbd2: add the missing unlock_buffer() in the error path of jbd2_write_superblock() (bsc#1175772).\n- kabi: genetlink: remove genl_bind (kabi).\n- kabi: hide new parameter of ip6_dst_lookup_flow() (bsc#1165629).\n- kabi: mask changes to struct ipv6_stub (bsc#1165629).\n- kernel/cpu_pm: Fix uninitted local in cpu_pm (git fixes (kernel/pm)).\n- kernel-docs: Change Requires on python-Sphinx to earlier than version 3 References: bsc#1166965 From 3 on the internal API that the build system uses was rewritten in an incompatible way. See https://github.com/sphinx-doc/sphinx/issues/7421 and https://bugzilla.suse.com/show_bug.cgi?id=1166965#c16 for some details.\n- kernel/relay.c: fix memleak on destroy relay channel (git-fixes).\n- kernfs: do not call fsnotify() with name without a parent (bsc#1175770).\n- KVM: arm64: Ensure \u0027params\u0027 is initialised when looking up sys register (bsc#1133021).\n- KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART (bsc#1133021).\n- KVM: arm/arm64: Fix young bit from mmu notifier (bsc#1133021).\n- KVM: arm/arm64: vgic: Do not rely on the wrong pending table (bsc#1133021).\n- KVM: arm/arm64: vgic-its: Fix restoration of unmapped collections (bsc#1133021).\n- KVM: arm: Fix DFSR setting for non-LPAE aarch32 guests (bsc#1133021).\n- KVM: arm: Make inject_abt32() inject an external abort instead (bsc#1133021).\n- kvm: Change offset in kvm_write_guest_offset_cached to unsigned (bsc#1133021).\n- KVM: Check for a bad hva before dropping into the ghc slow path (bsc#1133021).\n- KVM: PPC: Book3S PR: Remove uninitialized_var() usage (bsc#1065729).\n- l2tp: remove skb_dst_set() from l2tp_xmit_skb() (networking-stable-20_07_17).\n- leds: 88pm860x: fix use-after-free on unbind (git-fixes).\n- leds: core: Flush scheduled work for system suspend (git-fixes).\n- leds: da903x: fix use-after-free on unbind (git-fixes).\n- leds: lm3533: fix use-after-free on unbind (git-fixes).\n- leds: lm355x: avoid enum conversion warning (git-fixes).\n- leds: wm831x-status: fix use-after-free on unbind (git-fixes).\n- lib/dim: Fix -Wunused-const-variable warnings (bsc#1174852).\n- lib: dimlib: fix help text typos (bsc#1174852).\n- lib: logic_pio: Add logic_pio_unregister_range() (bsc#1174658).\n- lib: logic_pio: Avoid possible overlap for unregistering regions (bsc#1174658).\n- lib: logic_pio: Fix RCU usage (bsc#1174658).\n- linux/dim: Add completions count to dim_sample (bsc#1174852).\n- linux/dim: Fix overflow in dim calculation (bsc#1174852).\n- linux/dim: Move implementation to .c files (bsc#1174852).\n- linux/dim: Move logic to dim.h (bsc#1174852).\n- linux/dim: Remove \u0027net\u0027 prefix from internal DIM members (bsc#1174852).\n- linux/dim: Rename externally exposed macros (bsc#1174852).\n- linux/dim: Rename externally used net_dim members (bsc#1174852).\n- linux/dim: Rename net_dim_sample() to net_dim_update_sample() (bsc#1174852).\n- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).\n- llc: make sure applications use ARPHRD_ETHER (networking-stable-20_07_17).\n- mac80211: mesh: Free ie data when leaving mesh (git-fixes).\n- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).\n- MAINTAINERS: add entry for Dynamic Interrupt Moderation (bsc#1174852).\n- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (git-fixes).\n- md/raid5: Fix Force reconstruct-write io stuck in degraded raid5 (git-fixes).\n- media: budget-core: Improve exception handling in budget_register() (git-fixes).\n- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).\n- media: firewire: Using uninitialized values in node_probe() (git-fixes).\n- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).\n- media: vpss: clean up resources in init (git-fixes).\n- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).\n- mfd: dln2: Run event handler loop under spinlock (git-fixes).\n- mfd: rk808: Fix RK818 ID template (bsc#1175412).\n- mld: fix memory leak in ipv6_mc_destroy_dev() (networking-stable-20_06_28).\n- mm: filemap: clear idle flag for writes (bsc#1175769).\n- mm/migrate.c: add missing flush_dcache_page for non-mapped page migrate (git fixes (mm/migrate)).\n- mm/mmu_notifier: use hlist_add_head_rcu() (git fixes (mm/mmu_notifiers)).\n- mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() (git fixes (mm/compaction)).\n- mm/rmap.c: do not reuse anon_vma if we just want a copy (git fixes (mm/rmap)).\n- mm/shmem.c: cast the type of unmap_start to u64 (git fixes (mm/shmem)).\n- mm, thp: fix defrag setting if newline is not used (git fixes (mm/thp)).\n- mm/vunmap: add cond_resched() in vunmap_pmd_range (bsc#1175654 ltc#184617).\n- mtd: spi-nor: Fix an error code in spi_nor_read_raw() (bsc#1175413).\n- mtd: spi-nor: fix kernel-doc for spi_nor::info (bsc#1175414).\n- mtd: spi-nor: fix kernel-doc for spi_nor::reg_proto (bsc#1175415).\n- mtd: spi-nor: fix silent truncation in spi_nor_read_raw() (bsc#1175416).\n- mwifiex: Prevent memory corruption handling keys (git-fixes).\n- net: Added pointer check for dst-\u003eops-\u003eneigh_lookup in dst_neigh_lookup_skb (git-fixes).\n- net: bridge: enfore alignment for ethernet address (networking-stable-20_06_28).\n- net: core: reduce recursion limit value (networking-stable-20_06_28).\n- net: Do not clear the sock TX queue in sk_set_socket() (networking-stable-20_06_28).\n- net: dsa: b53: check for timeout (git-fixes).\n- net: ena: Add first_interrupt field to napi struct (bsc#1174852).\n- net: ena: add reserved PCI device ID (bsc#1174852).\n- net: ena: add support for reporting of packet drops (bsc#1174852).\n- net: ena: add support for the rx offset feature (bsc#1174852).\n- net: ena: add support for traffic mirroring (bsc#1174852).\n- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).\n- net: ena: allow setting the hash function without changing the key (bsc#1174852).\n- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).\n- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).\n- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).\n- net: ena: change num_queues to num_io_queues for clarity and consistency (bsc#1174852).\n- net: ena: changes to RSS hash key allocation (bsc#1174852).\n- net: ena: Change WARN_ON expression in ena_del_napi_in_range() (bsc#1174852).\n- net: ena: clean up indentation issue (bsc#1174852).\n- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).\n- net: ena: cosmetic: code reorderings (bsc#1174852).\n- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).\n- net: ena: cosmetic: fix line break issues (bsc#1174852).\n- net: ena: cosmetic: fix spacing issues (bsc#1174852).\n- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).\n- net: ena: cosmetic: minor code changes (bsc#1174852).\n- net: ena: cosmetic: remove unnecessary code (bsc#1174852).\n- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).\n- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).\n- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).\n- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).\n- net: ena: drop superfluous prototype (bsc#1174852).\n- net: ena: enable support of rss hash key and function changes (bsc#1174852).\n- net: ena: enable the interrupt_moderation in driver_supported_features (bsc#1174852).\n- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).\n- net: ena: ethtool: get_channels: use combined only (bsc#1174852).\n- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).\n- net: ena: ethtool: support set_channels callback (bsc#1174852).\n- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).\n- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).\n- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).\n- net: ena: fix incorrect setting of the number of msix vectors (bsc#1174852).\n- net: ena: fix incorrect update of intr_delay_resolution (bsc#1174852).\n- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).\n- net: ena: fix update of interrupt moderation register (bsc#1174852).\n- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).\n- net: ena: implement XDP drop support (bsc#1174852).\n- net: ena: Implement XDP_TX action (bsc#1174852).\n- net: ena: make ethtool -l show correct max number of queues (bsc#1174852).\n- net: ena: Make missed_tx stat incremental (bsc#1083548).\n- net: ena: Make some functions static (bsc#1174852).\n- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).\n- net: ena: multiple queue creation related cleanups (bsc#1174852).\n- net: ena: Prevent reset after device destruction (bsc#1083548).\n- net: ena: reduce driver load time (bsc#1174852).\n- net: ena: remove all old adaptive rx interrupt moderation code from ena_com (bsc#1174852).\n- net: ena: remove code duplication in ena_com_update_nonadaptive_moderation_interval _*() (bsc#1174852).\n- net: ena: remove code that does nothing (bsc#1174852).\n- net: ena: remove ena_restore_ethtool_params() and relevant fields (bsc#1174852).\n- net: ena: remove old adaptive interrupt moderation code from ena_netdev (bsc#1174852).\n- net: ena: remove redundant print of number of queues (bsc#1174852).\n- net: ena: remove set but not used variable \u0027hash_key\u0027 (bsc#1174852).\n- net: ena: remove set but not used variable \u0027rx_ring\u0027 (bsc#1174852).\n- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).\n- net: ena: Select DIMLIB for ENA_ETHERNET (bsc#1174852).\n- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).\n- net: ena: support new LLQ acceleration mode (bsc#1174852).\n- net: ena: switch to dim algorithm for rx adaptive interrupt moderation (bsc#1174852).\n- net: ena: use explicit variable size for clarity (bsc#1174852).\n- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).\n- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1174852).\n- net: ena: xdp: XDP_TX: fix memory leak (bsc#1174852).\n- net: ethernet: aquantia: Fix wrong return value (git-fixes).\n- net: ethernet: broadcom: have drivers select DIMLIB as needed (bsc#1174852).\n- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).\n- net: fec: correct the error path for regulator disable in probe (git-fixes).\n- netfilter: x_tables: add counters allocation wrapper (git-fixes).\n- netfilter: x_tables: cap allocations at 512 mbyte (git-fixes).\n- netfilter: x_tables: limit allocation requests for blob rule heads (git-fixes).\n- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)\n- net: fix memleak in register_netdevice() (networking-stable-20_06_28).\n- net: Fix the arp error in some cases (networking-stable-20_06_28).\n- net: gre: recompute gre csum for sctp over gre tunnels (git-fixes).\n- net: hns3: add autoneg and change speed support for fibre port (bsc#1174070).\n- net: hns3: add support for FEC encoding control (bsc#1174070).\n- net: hns3: add support for multiple media type (bsc#1174070).\n- net: hns3: fix a not link up issue when fibre port supports autoneg (bsc#1174070).\n- net: hns3: fix for FEC configuration (bsc#1174070).\n- net: hns3: fix port capbility updating issue (bsc#1174070).\n- net: hns3: fix port setting handle for fibre port (bsc#1174070).\n- net: hns3: fix selftest fail issue for fibre port with autoneg on (bsc#1174070).\n- net: hns3: restore the MAC autoneg state after reset (bsc#1174070).\n- net: increment xmit_recursion level in dev_direct_xmit() (networking-stable-20_06_28).\n- net: ip6_gre: Request headroom in __gre6_xmit() (git-fixes).\n- net: lan78xx: add missing endpoint sanity check (git-fixes).\n- net: lan78xx: fix transfer-buffer memory leak (git-fixes).\n- net: make symbol \u0027flush_works\u0027 static (git-fixes).\n- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).\n- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).\n- net: netsec: Fix signedness bug in netsec_probe() (bsc#1175417).\n- net: netsec: initialize tx ring on ndo_open (bsc#1175418).\n- net: phy: Check harder for errors in get_phy_id() (bsc#1111666).\n- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).\n- net: Set fput_needed iff FDPUT_FPUT is set (git-fixes).\n- net: socionext: Fix a signedness bug in ave_probe() (bsc#1175419).\n- net: socionext: replace napi_alloc_frag with the netdev variant on init (bsc#1175420).\n- net: spider_net: Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- net: stmmac: dwmac1000: provide multicast filter fallback (git-fixes).\n- net: stmmac: Fix RX packet size \u003e 8191 (git-fixes).\n- net: udp: Fix wrong clean up for IS_UDPLITE macro (git-fixes).\n- net: update net_dim documentation after rename (bsc#1174852).\n- net: usb: ax88179_178a: fix packet alignment padding (networking-stable-20_06_28).\n- net: usb: qmi_wwan: add support for Quectel EG95 LTE modem (networking-stable-20_07_17).\n- netvsc: unshare skb in VF rx handler (git-fixes).\n- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).\n- NTB: Fix an error in get link status (git-fixes).\n- ntb_netdev: fix sleep time mismatch (git-fixes).\n- NTB: ntb_transport: Use scnprintf() for avoiding potential buffer overflow (git-fixes).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme-multipath: do not fall back to __nvme_find_path() for non-optimized paths (bsc#1172108).\n- nvme-multipath: fix logic for non-optimized paths (bsc#1172108).\n- nvme-multipath: round-robin: eliminate \u0027fallback\u0027 variable (bsc#1172108).\n- nvme: multipath: round-robin: fix single non-optimized path case (bsc#1172108).\n- obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).\n- ocfs2: add trimfs dlm lock resource (bsc#1175228).\n- ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).\n- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n- ocfs2: change slot number type s16 to u16 (bsc#1175786).\n- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n- ocfs2: fix remounting needed after setfacl command (bsc#1173954).\n- ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).\n- ocfs2: fix value of OCFS2_INVALID_SLOT (bsc#1175767).\n- ocfs2: load global_inode_alloc (bsc#1172963).\n- ocfs2: load global_inode_alloc (bsc#1172963).\n- omapfb: dss: Fix max fclk divider for omap36xx (bsc#1113956)\n- openvswitch: Prevent kernel-infoleak in ovs_ct_put_key() (git-fixes).\n- PCI/ASPM: Add missing newline in sysfs \u0027policy\u0027 (git-fixes).\n- PCI: dwc: Move interrupt acking into the proper callback (bsc#1175666).\n- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).\n- PCI: Fix \u0027try\u0027 semantics of bus and slot reset (git-fixes).\n- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).\n- PCI: hv: Fix a timing issue which causes kdump to fail occasionally (bsc#1172871, bsc#1172872, git-fixes).\n- PCI: Release IVRS table in AMD ACS quirk (git-fixes).\n- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).\n- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).\n- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).\n- pinctrl: single: fix function name in documentation (git-fixes).\n- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).\n- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).\n- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).\n- PM / CPU: replace raw_notifier with atomic_notifier (git fixes (kernel/pm)).\n- PM / devfreq: rk3399_dmc: Add missing of_node_put() (bsc#1175668).\n- PM / devfreq: rk3399_dmc: Disable devfreq-event device when fails.\n- PM / devfreq: rk3399_dmc: Fix kernel oops when rockchip,pmu is absent (bsc#1175668).\n- PM: sleep: core: Fix the handling of pending runtime resume requests (git-fixes).\n- powerpc/64s: Do not init FSCR_DSCR in __init_FSCR() (bsc#1065729).\n- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).\n- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).\n- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).\n- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).\n- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).\n- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).\n- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).\n- powerpc/perf: Fix missing is_sier_aviable() during build (bsc#1065729).\n- powerpc/pseries: Do not initiate shutdown when system is running on UPS (bsc#1175440 ltc#187574).\n- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).\n- powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU death (bsc#1085030 ltC#165630).\n- powerpc/pseries: PCIE PHB reset (bsc#1174689).\n- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).\n- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).\n- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).\n- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).\n- propagate_one(): mnt_set_mountpoint() needs mount_lock (bsc#1174841).\n- pseries: Fix 64 bit logical memory block panic (bsc#1065729).\n- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).\n- rds: Prevent kernel-infoleak in rds_notify_queue_get() (git-fixes).\n- Revert \u0027ALSA: hda: call runtime_allow() for all hda controllers\u0027 (bsc#1111666).\n- Revert \u0027drm/amdgpu: Fix NULL dereference in dpm sysfs handlers\u0027 (bsc#1113956) \t* refresh for context changes\n- Revert \u0027ocfs2: avoid inode removal while nfsd is accessing it\u0027 This reverts commit 9e096c72476eda333a9998ff464580c00ff59c83.\n- Revert \u0027ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\u0027 This reverts commit 0bf6e248f93736b3f17f399b4a8f64ffa30d371e.\n- Revert \u0027ocfs2: load global_inode_alloc (bsc#1172963).\u0027 This reverts commit fc476497b53f967dc615b9cbad9427ba3107b5c4.\n- Revert pciehp patches that broke booting (bsc#1174887) \n- Revert \u0027scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe\u0027 (bsc#1171688 bsc#1174003).\n- Revert \u0027scsi: qla2xxx: Fix crash on qla2x00_mailbox_command\u0027 (bsc#1171688 bsc#1174003).\n- Revert \u0027xen/balloon: Fix crash when ballooning on x86 32 bit PAE\u0027 (bsc#1065600).\n- rocker: fix incorrect error handling in dma_rings_init (networking-stable-20_06_28).\n- rpm/check-for-config-changes: Ignore CONFIG_CC_VERSION_TEXT\n- rpm/check-for-config-changes: Ignore CONFIG_LD_VERSION\n- rpm/constraints.in: Increase memory for kernel-docs References: https://build.opensuse.org/request/show/792664\n- rpm: drop execute permissions on source files Sometimes a source file with execute permission appears in upstream repository and makes it into our kernel-source packages. This is caught by OBS build checks and may even result in build failures. Sanitize the source tree by removing execute permissions from all C source and header files.\n- rpm/kabi.pl: account for namespace field being moved last Upstream is moving the namespace field in Module.symvers last in order to preserve backwards compatibility with kmod tools (depmod, etc). Fix the kabi.pl script to expect the namespace field last. Since split() ignores trailing empty fields and delimeters, switch to using tr to count how many fields/tabs are in a line. Also, in load_symvers(), pass LIMIT of -1 to split() so it does not strip trailing empty fields, as namespace is an optional field.\n- rpm/kernel-binary.spec.in: do not run klp-symbols for configs with no modules Starting with 5.8-rc1, s390x/zfcpdump builds fail because rpm/klp-symbols script does not find .tmp_versions directory. This is missing because s390x/zfcpdump is built without modules (CONFIG_MODULES disabled). As livepatching cannot work without modules, the cleanest solution is setting %klp_symbols to 0 if CONFIG_MODULES is disabled. (We cannot simply add another condition to the place where %klp_symbols is set as it can be already set to 1 from prjconf.)\n- rpm/kernel-binary.spec.in: restrict livepatch metapackage to default flavor It has been reported that the kernel-*-livepatch metapackage got erroneously enabled for SLE15-SP3\u0027s new -preempt flavor, leading to a unresolvable dependency to a non-existing kernel-livepatch-x.y.z-preempt package. As SLE12 and SLE12-SP1 have run out of livepatching support, the need to build said metapackage for the -xen flavor is gone and the only remaining flavor for which they\u0027re still wanted is -default. Restrict the build of the kernel-*-livepatch metapackage to the -default flavor.\n- rpm/kernel-obs-build.spec.in: add dm-crypt for building with cryptsetup Co-Authored-By: Adam Spiers \u003caspiers@suse.com\u003e\n- rpm/kernel-obs-build.spec.in: Enable overlayfs Overlayfs is needed for podman or docker builds when no more specific driver can be used (like lvm or btrfs). As the default build fs is ext4 currently, we need overlayfs kernel modules to be available.\n- rpm/kernel-source.spec.in: Add obsolete_rebuilds (boo#1172073).\n- rpm/mkspec-dtb: add mt76 based dtb package\n- rpm/package-descriptions: garbege collection remove old ARM and Xen flavors.\n- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).\n- s390, dcssblk: kaddr and pfn can be NULL to -\u003edirect_access() (bsc#1174873).\n- sched: consistently handle layer3 header accesses in the presence of VLANs (networking-stable-20_07_17).\n- scripts/git_sort/git_sort.py: add bluetooth/bluetooth-next.git repository\n- scsi: dh: Add Fujitsu device to devinfo and dh lists (bsc#1174026).\n- scsi: Fix trivial spelling (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Address a set of sparse warnings (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Change {RD,WRT}_REG_*() function names from upper case into lower case (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix endianness annotations in header files (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix endianness annotations in source files (bsc#1171688 bsc#1174003). \n- scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix issue with adapter\u0027s stopping state (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix login timeout (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix null pointer access during disconnect from subsystem (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix spelling of a variable name (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix warning after FC target reset (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Flush all sessions on zone disable (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Flush I/O on zone disable (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Initialize \u0027n\u0027 before using it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Reduce noisy debug message (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove an unused function (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove a superfluous cast (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: SAN congestion management implementation (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use register names instead of register offsets (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use true, false for ha-\u003efw_dumped (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1171688 bsc#1174003).\n- scsi: smartpqi: add bay identifier (bsc#1172418).\n- scsi: smartpqi: add gigabyte controller (bsc#1172418).\n- scsi: smartpqi: add id support for SmartRAID 3152-8i (bsc#1172418).\n- scsi: smartpqi: add inquiry timeouts (bsc#1172418).\n- scsi: smartpqi: add module param for exposure order (bsc#1172418).\n- scsi: smartpqi: add module param to hide vsep (bsc#1172418).\n- scsi: smartpqi: add new pci ids (bsc#1172418).\n- scsi: smartpqi: add pci ids for fiberhome controller (bsc#1172418).\n- scsi: smartpqi: add RAID bypass counter (bsc#1172418).\n- scsi: smartpqi: add sysfs entries (bsc#1172418).\n- scsi: smartpqi: Align driver syntax with oob (bsc#1172418).\n- scsi: smartpqi: avoid crashing kernel for controller issues (bsc#1172418).\n- scsi: smartpqi: bump version (bsc#1172418).\n- scsi: smartpqi: bump version (bsc#1172418).\n- scsi: smartpqi: bump version to 1.2.16-010 (bsc#1172418).\n- scsi: smartpqi: change TMF timeout from 60 to 30 seconds (bsc#1172418).\n- scsi: smartpqi: correct hang when deleting 32 lds (bsc#1172418).\n- scsi: smartpqi: correct REGNEWD return status (bsc#1172418).\n- scsi: smartpqi: correct syntax issue (bsc#1172418).\n- scsi: smartpqi: fix call trace in device discovery (bsc#1172418).\n- scsi: smartpqi: fix controller lockup observed during force reboot (bsc#1172418).\n- scsi: smartpqi: fix LUN reset when fw bkgnd thread is hung (bsc#1172418).\n- scsi: smartpqi: fix problem with unique ID for physical device (bsc#1172418).\n- scsi: smartpqi: identify physical devices without issuing INQUIRY (bsc#1172418).\n- scsi: smartpqi: properly set both the DMA mask and the coherent DMA mask (bsc#1172418).\n- scsi: smartpqi: remove unused manifest constants (bsc#1172418).\n- scsi: smartpqi: Reporting unhandled SCSI errors (bsc#1172418).\n- scsi: smartpqi: support device deletion via sysfs (bsc#1172418).\n- scsi: smartpqi: update copyright (bsc#1172418).\n- scsi: smartpqi: update logical volume size after expansion (bsc#1172418).\n- scsi: smartpqi: Use scnprintf() for avoiding potential buffer overflow (bsc#1172418).\n- scsi: storvsc: Correctly set number of hardware queues for IDE disk (git-fixes).\n- scsi: target/iblock: fix WRITE SAME zeroing (bsc#1169790).\n- sctp: Do not advertise IPv4 addresses if ipv6only is set on the socket (networking-stable-20_06_28).\n- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).\n- serial: 8250: change lock order in serial8250_do_startup() (git-fixes).\n- serial: pl011: Do not leak amba_ports entry on driver register error (git-fixes).\n- serial: pl011: Fix oops on -EPROBE_DEFER (git-fixes).\n- Set VIRTIO_CONSOLE=y (bsc#1175667).\n- sign also s390x kernel images (bsc#1163524)\n- soc: fsl: qbman: allow registering a device link for the portal user (bsc#1174550).\n- soc: fsl: qbman_portals: add APIs to retrieve the probing status (bsc#1174550).\n- spi: davinci: Remove uninitialized_var() usage (git-fixes).\n- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).\n- spi: nxp-fspi: Ensure width is respected in spi-mem operations (bsc#1175421).\n- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1175422).\n- spi: spi-mem: export spi_mem_default_supports_op() (bsc#1175421).\n- staging: fsl-dpaa2: ethsw: Add missing netdevice check (bsc#1175423).\n- tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT (networking-stable-20_06_28).\n- tcp: grow window for OOO packets only for SACK flows (networking-stable-20_06_28).\n- tcp: make sure listeners do not initialize congestion-control state (networking-stable-20_07_17).\n- tcp: md5: add missing memory barriers in tcp_md5_do_add()/tcp_md5_hash_key() (networking-stable-20_07_17).\n- tcp: md5: do not send silly options in SYNCOOKIES (networking-stable-20_07_17).\n- tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key() barriers (networking-stable-20_07_17).\n- tracepoint: Mark __tracepoint_string\u0027s __used (git-fixes).\n- tracing: Use trace_sched_process_free() instead of exit() for pid tracing (git-fixes).\n- tty: serial: fsl_lpuart: add imx8qxp support (bsc#1175670).\n- tty: serial: fsl_lpuart: free IDs allocated by IDA (bsc#1175670).\n- Update patch reference for a tipc fix patch (bsc#1175515)\n- USB: cdc-acm: rework notification_buffer resizing (git-fixes).\n- USB: gadget: f_tcm: Fix some resource leaks in some error paths (git-fixes).\n- USB: host: ohci-exynos: Fix error handling in exynos_ohci_probe() (git-fixes).\n- USB: Ignore UAS for JMicron JMS567 ATA/ATAPI Bridge (git-fixes).\n- USB: iowarrior: fix up report size handling for some devices (git-fixes).\n- usbip: tools: fix module name in man page (git-fixes).\n- USB: rename USB quirk to USB_QUIRK_ENDPOINT_IGNORE (git-fixes).\n- USB: serial: cp210x: enable USB generic throttle/unthrottle (git-fixes).\n- USB: serial: cp210x: re-enable auto-RTS on open (git-fixes).\n- USB: serial: ftdi_sio: clean up receive processing (git-fixes).\n- USB: serial: ftdi_sio: fix break and sysrq handling (git-fixes).\n- USB: serial: ftdi_sio: make process-packet buffer unsigned (git-fixes).\n- USB: serial: iuu_phoenix: fix led-activity helpers (git-fixes).\n- USB: serial: qcserial: add EM7305 QDL product ID (git-fixes).\n- USB: xhci: define IDs for various ASMedia host controllers (git-fixes).\n- USB: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).\n- USB: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).\n- USB: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).\n- VFS: Check rename_lock in lookup_fast() (bsc#1174734).\n- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).\n- video: pxafb: Fix the function used to balance a \u0027dma_alloc_coherent()\u0027 call (git-fixes).\n- vlan: consolidate VLAN parsing code and limit max parsing depth (networking-stable-20_07_17).\n- vmxnet3: use correct tcp hdr length when packet is encapsulated (bsc#1175199).\n- vt_compat_ioctl(): clean up, use compat_ptr() properly (git-fixes).\n- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).\n- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (bsc#1111666).\n- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (bsc#1111666).\n- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (bsc#1111666).\n- wl1251: fix always return 0 error (git-fixes).\n- x86/hyperv: Create and use Hyper-V page definitions (git-fixes).\n- x86/hyper-v: Fix overflow bug in fill_gva_list() (git-fixes).\n- x86/hyperv: Make hv_vcpu_is_preempted() visible (git-fixes).\n- xen/balloon: fix accounting in alloc_xenballooned_pages error path (bsc#1065600).\n- xen/balloon: make the balloon wait interruptible (bsc#1065600).\n- xfrm: check id proto in validate_tmpl() (git-fixes).\n- xfrm: clean up xfrm protocol checks (git-fixes).\n- xfrm_user: uncoditionally validate esn replay attribute struct (git-fixes).\n- xfs: fix inode allocation block res calculation precedence (git-fixes).\n- xfs: fix reflink quota reservation accounting error (git-fixes).\n- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2541,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2541", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2541-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2541-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202541-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2541-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1074701", "url": "https://bugzilla.suse.com/1074701" }, { "category": "self", "summary": "SUSE Bug 1083548", "url": "https://bugzilla.suse.com/1083548" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1085235", "url": "https://bugzilla.suse.com/1085235" }, { "category": "self", "summary": "SUSE Bug 1085308", "url": "https://bugzilla.suse.com/1085308" }, { "category": "self", "summary": "SUSE Bug 1087078", "url": "https://bugzilla.suse.com/1087078" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1094912", "url": "https://bugzilla.suse.com/1094912" }, { "category": "self", "summary": "SUSE Bug 1100394", "url": "https://bugzilla.suse.com/1100394" }, { "category": "self", "summary": "SUSE Bug 1102640", "url": "https://bugzilla.suse.com/1102640" }, { "category": "self", "summary": "SUSE Bug 1105412", "url": "https://bugzilla.suse.com/1105412" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1120163", "url": "https://bugzilla.suse.com/1120163" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1152148", "url": "https://bugzilla.suse.com/1152148" }, { "category": "self", "summary": "SUSE Bug 1163524", "url": "https://bugzilla.suse.com/1163524" }, { "category": "self", "summary": "SUSE Bug 1165629", "url": "https://bugzilla.suse.com/1165629" }, { "category": "self", "summary": "SUSE Bug 1166965", "url": "https://bugzilla.suse.com/1166965" }, { "category": "self", "summary": "SUSE Bug 1169790", "url": "https://bugzilla.suse.com/1169790" }, { "category": "self", "summary": "SUSE Bug 1170232", "url": "https://bugzilla.suse.com/1170232" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1171988", "url": "https://bugzilla.suse.com/1171988" }, { "category": "self", "summary": "SUSE Bug 1172073", "url": "https://bugzilla.suse.com/1172073" }, { "category": "self", "summary": "SUSE Bug 1172108", "url": "https://bugzilla.suse.com/1172108" }, { "category": "self", "summary": "SUSE Bug 1172247", "url": "https://bugzilla.suse.com/1172247" }, { "category": "self", "summary": "SUSE Bug 1172418", "url": "https://bugzilla.suse.com/1172418" }, { "category": "self", "summary": "SUSE Bug 1172428", "url": "https://bugzilla.suse.com/1172428" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172871", "url": "https://bugzilla.suse.com/1172871" }, { "category": "self", "summary": "SUSE Bug 1172872", "url": "https://bugzilla.suse.com/1172872" }, { "category": "self", "summary": "SUSE Bug 1172873", "url": "https://bugzilla.suse.com/1172873" }, { "category": "self", "summary": "SUSE Bug 1172963", "url": "https://bugzilla.suse.com/1172963" }, { "category": "self", "summary": "SUSE Bug 1173485", "url": "https://bugzilla.suse.com/1173485" }, { "category": "self", "summary": "SUSE Bug 1173798", "url": "https://bugzilla.suse.com/1173798" }, { "category": "self", "summary": "SUSE Bug 1173954", "url": "https://bugzilla.suse.com/1173954" }, { "category": "self", "summary": "SUSE Bug 1174003", "url": "https://bugzilla.suse.com/1174003" }, { "category": "self", "summary": "SUSE Bug 1174026", "url": "https://bugzilla.suse.com/1174026" }, { "category": "self", "summary": "SUSE Bug 1174070", "url": "https://bugzilla.suse.com/1174070" }, { "category": "self", "summary": "SUSE Bug 1174161", "url": "https://bugzilla.suse.com/1174161" }, { "category": "self", "summary": "SUSE Bug 1174205", "url": "https://bugzilla.suse.com/1174205" }, { "category": "self", "summary": "SUSE Bug 1174387", "url": "https://bugzilla.suse.com/1174387" }, { "category": "self", "summary": "SUSE Bug 1174484", "url": "https://bugzilla.suse.com/1174484" }, { "category": "self", "summary": "SUSE Bug 1174547", "url": "https://bugzilla.suse.com/1174547" }, { "category": "self", "summary": "SUSE Bug 1174549", "url": "https://bugzilla.suse.com/1174549" }, { "category": "self", "summary": "SUSE Bug 1174550", "url": "https://bugzilla.suse.com/1174550" }, { "category": "self", "summary": "SUSE Bug 1174625", "url": "https://bugzilla.suse.com/1174625" }, { "category": "self", "summary": "SUSE Bug 1174658", "url": "https://bugzilla.suse.com/1174658" }, { "category": "self", "summary": "SUSE Bug 1174685", "url": "https://bugzilla.suse.com/1174685" }, { "category": "self", "summary": "SUSE Bug 1174689", "url": "https://bugzilla.suse.com/1174689" }, { "category": "self", "summary": "SUSE Bug 1174699", "url": "https://bugzilla.suse.com/1174699" }, { "category": "self", "summary": "SUSE Bug 1174734", "url": "https://bugzilla.suse.com/1174734" }, { "category": "self", "summary": "SUSE Bug 1174757", "url": "https://bugzilla.suse.com/1174757" }, { "category": "self", "summary": "SUSE Bug 1174771", "url": "https://bugzilla.suse.com/1174771" }, { "category": "self", "summary": "SUSE Bug 1174840", "url": "https://bugzilla.suse.com/1174840" }, { "category": "self", "summary": "SUSE Bug 1174841", "url": "https://bugzilla.suse.com/1174841" }, { "category": "self", "summary": "SUSE Bug 1174843", "url": "https://bugzilla.suse.com/1174843" }, { "category": "self", "summary": "SUSE Bug 1174844", "url": "https://bugzilla.suse.com/1174844" }, { "category": "self", "summary": "SUSE Bug 1174845", "url": "https://bugzilla.suse.com/1174845" }, { "category": "self", "summary": "SUSE Bug 1174852", "url": "https://bugzilla.suse.com/1174852" }, { "category": "self", "summary": "SUSE Bug 1174873", "url": "https://bugzilla.suse.com/1174873" }, { "category": "self", "summary": "SUSE Bug 1174887", "url": "https://bugzilla.suse.com/1174887" }, { "category": "self", "summary": "SUSE Bug 1174904", "url": "https://bugzilla.suse.com/1174904" }, { "category": "self", "summary": "SUSE Bug 1174926", "url": "https://bugzilla.suse.com/1174926" }, { "category": "self", "summary": "SUSE Bug 1174968", "url": "https://bugzilla.suse.com/1174968" }, { "category": "self", "summary": "SUSE Bug 1175062", "url": "https://bugzilla.suse.com/1175062" }, { "category": "self", "summary": "SUSE Bug 1175063", "url": "https://bugzilla.suse.com/1175063" }, { "category": "self", "summary": "SUSE Bug 1175064", "url": "https://bugzilla.suse.com/1175064" }, { "category": "self", "summary": "SUSE Bug 1175065", "url": "https://bugzilla.suse.com/1175065" }, { "category": "self", "summary": "SUSE Bug 1175066", "url": "https://bugzilla.suse.com/1175066" }, { "category": "self", "summary": "SUSE Bug 1175067", "url": "https://bugzilla.suse.com/1175067" }, { "category": "self", "summary": "SUSE Bug 1175112", "url": "https://bugzilla.suse.com/1175112" }, { "category": "self", "summary": "SUSE Bug 1175127", "url": "https://bugzilla.suse.com/1175127" }, { "category": "self", "summary": "SUSE Bug 1175128", "url": "https://bugzilla.suse.com/1175128" }, { "category": "self", "summary": "SUSE Bug 1175149", "url": "https://bugzilla.suse.com/1175149" }, { "category": "self", "summary": "SUSE Bug 1175199", "url": "https://bugzilla.suse.com/1175199" }, { "category": "self", "summary": "SUSE Bug 1175213", "url": "https://bugzilla.suse.com/1175213" }, { "category": "self", "summary": "SUSE Bug 1175228", "url": "https://bugzilla.suse.com/1175228" }, { "category": "self", "summary": "SUSE Bug 1175232", "url": "https://bugzilla.suse.com/1175232" }, { "category": "self", "summary": "SUSE Bug 1175284", "url": "https://bugzilla.suse.com/1175284" }, { "category": "self", "summary": "SUSE Bug 1175393", "url": "https://bugzilla.suse.com/1175393" }, { "category": "self", "summary": "SUSE Bug 1175394", "url": "https://bugzilla.suse.com/1175394" }, { "category": "self", "summary": "SUSE Bug 1175396", "url": "https://bugzilla.suse.com/1175396" }, { "category": "self", "summary": "SUSE Bug 1175397", "url": "https://bugzilla.suse.com/1175397" }, { "category": "self", "summary": "SUSE Bug 1175398", "url": "https://bugzilla.suse.com/1175398" }, { "category": "self", "summary": "SUSE Bug 1175399", "url": "https://bugzilla.suse.com/1175399" }, { "category": "self", "summary": "SUSE Bug 1175400", "url": "https://bugzilla.suse.com/1175400" }, { "category": "self", "summary": "SUSE Bug 1175401", "url": "https://bugzilla.suse.com/1175401" }, { "category": "self", "summary": "SUSE Bug 1175402", "url": "https://bugzilla.suse.com/1175402" }, { "category": "self", "summary": "SUSE Bug 1175403", "url": "https://bugzilla.suse.com/1175403" }, { "category": "self", "summary": "SUSE Bug 1175404", "url": "https://bugzilla.suse.com/1175404" }, { "category": "self", "summary": "SUSE Bug 1175405", "url": "https://bugzilla.suse.com/1175405" }, { "category": "self", "summary": "SUSE Bug 1175406", "url": "https://bugzilla.suse.com/1175406" }, { "category": "self", "summary": "SUSE Bug 1175407", "url": "https://bugzilla.suse.com/1175407" }, { "category": "self", "summary": "SUSE Bug 1175408", "url": "https://bugzilla.suse.com/1175408" }, { "category": "self", "summary": "SUSE Bug 1175409", "url": "https://bugzilla.suse.com/1175409" }, { "category": "self", "summary": "SUSE Bug 1175410", "url": "https://bugzilla.suse.com/1175410" }, { "category": "self", "summary": "SUSE Bug 1175411", "url": "https://bugzilla.suse.com/1175411" }, { "category": "self", "summary": "SUSE Bug 1175412", "url": "https://bugzilla.suse.com/1175412" }, { "category": "self", "summary": "SUSE Bug 1175413", "url": "https://bugzilla.suse.com/1175413" }, { "category": "self", "summary": "SUSE Bug 1175414", "url": "https://bugzilla.suse.com/1175414" }, { "category": "self", "summary": "SUSE Bug 1175415", "url": "https://bugzilla.suse.com/1175415" }, { "category": "self", "summary": "SUSE Bug 1175416", "url": "https://bugzilla.suse.com/1175416" }, { "category": "self", "summary": "SUSE Bug 1175417", "url": "https://bugzilla.suse.com/1175417" }, { "category": "self", "summary": "SUSE Bug 1175418", "url": "https://bugzilla.suse.com/1175418" }, { "category": "self", "summary": "SUSE Bug 1175419", "url": "https://bugzilla.suse.com/1175419" }, { "category": "self", "summary": "SUSE Bug 1175420", "url": "https://bugzilla.suse.com/1175420" }, { "category": "self", "summary": "SUSE Bug 1175421", "url": "https://bugzilla.suse.com/1175421" }, { "category": "self", "summary": "SUSE Bug 1175422", "url": "https://bugzilla.suse.com/1175422" }, { "category": "self", "summary": "SUSE Bug 1175423", "url": "https://bugzilla.suse.com/1175423" }, { "category": "self", "summary": "SUSE Bug 1175440", "url": "https://bugzilla.suse.com/1175440" }, { "category": "self", "summary": "SUSE Bug 1175493", "url": "https://bugzilla.suse.com/1175493" }, { "category": "self", "summary": "SUSE Bug 1175515", "url": "https://bugzilla.suse.com/1175515" }, { "category": "self", "summary": "SUSE Bug 1175518", "url": "https://bugzilla.suse.com/1175518" }, { "category": "self", "summary": "SUSE Bug 1175526", "url": "https://bugzilla.suse.com/1175526" }, { "category": "self", "summary": "SUSE Bug 1175550", "url": "https://bugzilla.suse.com/1175550" }, { "category": "self", "summary": "SUSE Bug 1175654", "url": "https://bugzilla.suse.com/1175654" }, { "category": "self", "summary": "SUSE Bug 1175666", "url": "https://bugzilla.suse.com/1175666" }, { "category": "self", "summary": "SUSE Bug 1175667", "url": "https://bugzilla.suse.com/1175667" }, { "category": "self", "summary": "SUSE Bug 1175668", "url": "https://bugzilla.suse.com/1175668" }, { "category": "self", "summary": "SUSE Bug 1175669", "url": "https://bugzilla.suse.com/1175669" }, { "category": "self", "summary": "SUSE Bug 1175670", "url": "https://bugzilla.suse.com/1175670" }, { "category": "self", "summary": "SUSE Bug 1175767", "url": "https://bugzilla.suse.com/1175767" }, { "category": "self", "summary": "SUSE Bug 1175768", "url": "https://bugzilla.suse.com/1175768" }, { "category": "self", "summary": "SUSE Bug 1175769", "url": "https://bugzilla.suse.com/1175769" }, { "category": "self", "summary": "SUSE Bug 1175770", "url": "https://bugzilla.suse.com/1175770" }, { "category": "self", "summary": "SUSE Bug 1175771", "url": "https://bugzilla.suse.com/1175771" }, { "category": "self", "summary": "SUSE Bug 1175772", "url": "https://bugzilla.suse.com/1175772" }, { "category": "self", "summary": "SUSE Bug 1175786", "url": "https://bugzilla.suse.com/1175786" }, { "category": "self", "summary": "SUSE Bug 1175873", "url": "https://bugzilla.suse.com/1175873" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14314 page", "url": "https://www.suse.com/security/cve/CVE-2020-14314/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14356 page", "url": "https://www.suse.com/security/cve/CVE-2020-14356/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16166 page", "url": "https://www.suse.com/security/cve/CVE-2020-16166/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1749 page", "url": "https://www.suse.com/security/cve/CVE-2020-1749/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24394 page", "url": "https://www.suse.com/security/cve/CVE-2020-24394/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-09-04T15:36:19Z", "generator": { "date": "2020-09-04T15:36:19Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2541-1", "initial_release_date": "2020-09-04T15:36:19Z", "revision_history": [ { "date": "2020-09-04T15:36:19Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-8.41.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-8.41.1.noarch", "product_id": "kernel-devel-azure-4.12.14-8.41.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-8.41.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-8.41.1.noarch", "product_id": "kernel-source-azure-4.12.14-8.41.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-8.41.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-8.41.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-8.41.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-8.41.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-8.41.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-8.41.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-8.41.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-8.41.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-8.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-8.41.1.x86_64", "product": { "name": "kernel-azure-4.12.14-8.41.1.x86_64", "product_id": "kernel-azure-4.12.14-8.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-8.41.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-8.41.1.x86_64", "product_id": "kernel-azure-base-4.12.14-8.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-8.41.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-8.41.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-8.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-8.41.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-8.41.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-8.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-devel-4.12.14-8.41.1.x86_64", "product": { "name": "kernel-azure-livepatch-devel-4.12.14-8.41.1.x86_64", "product_id": "kernel-azure-livepatch-devel-4.12.14-8.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-8.41.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-8.41.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-8.41.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-8.41.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-8.41.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-8.41.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-8.41.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-8.41.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-8.41.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-4.12.14-8.41.1.x86_64", "product": { "name": "reiserfs-kmp-azure-4.12.14-8.41.1.x86_64", "product_id": "reiserfs-kmp-azure-4.12.14-8.41.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-8.41.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.41.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-8.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-8.41.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.41.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-8.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-8.41.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.41.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-8.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-8.41.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.41.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-8.41.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-8.41.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.41.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-8.41.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-8.41.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.41.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-8.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T15:36:19Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-14314", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14314" } ], "notes": [ { "category": "general", "text": "A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14314", "url": "https://www.suse.com/security/cve/CVE-2020-14314" }, { "category": "external", "summary": "SUSE Bug 1173798 for CVE-2020-14314", "url": "https://bugzilla.suse.com/1173798" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T15:36:19Z", "details": "moderate" } ], "title": "CVE-2020-14314" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T15:36:19Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14356" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14356", "url": "https://www.suse.com/security/cve/CVE-2020-14356" }, { "category": "external", "summary": "SUSE Bug 1175213 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1175213" }, { "category": "external", "summary": "SUSE Bug 1176392 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1176392" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T15:36:19Z", "details": "moderate" } ], "title": "CVE-2020-14356" }, { "cve": "CVE-2020-16166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16166" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16166", "url": "https://www.suse.com/security/cve/CVE-2020-16166" }, { "category": "external", "summary": "SUSE Bug 1174757 for CVE-2020-16166", "url": "https://bugzilla.suse.com/1174757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T15:36:19Z", "details": "moderate" } ], "title": "CVE-2020-16166" }, { "cve": "CVE-2020-1749", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1749" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1749", "url": "https://www.suse.com/security/cve/CVE-2020-1749" }, { "category": "external", "summary": "SUSE Bug 1165629 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165629" }, { "category": "external", "summary": "SUSE Bug 1165631 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165631" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177513" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1189302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T15:36:19Z", "details": "important" } ], "title": "CVE-2020-1749" }, { "cve": "CVE-2020-24394", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24394" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24394", "url": "https://www.suse.com/security/cve/CVE-2020-24394" }, { "category": "external", "summary": "SUSE Bug 1175518 for CVE-2020-24394", "url": "https://bugzilla.suse.com/1175518" }, { "category": "external", "summary": "SUSE Bug 1175992 for CVE-2020-24394", "url": "https://bugzilla.suse.com/1175992" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.41.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.41.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T15:36:19Z", "details": "important" } ], "title": "CVE-2020-24394" } ] }
suse-su-2020:2491-1
Vulnerability from csaf_suse
Published
2020-09-04 11:29
Modified
2020-09-04 11:29
Summary
Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3)
Description of the patch
This update for the Linux Kernel 4.4.180-94_103 fixes several issues.
The following security issues were fixed:
- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-0155: Fixed a privilege escalation in the i915 graphics driver (bsc#1173663).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2019-19447: Fixed a use-after-free in ext4_put_super (bsc#1173869).
- CVE-2019-18680: Fixed a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c (bsc#1173867).
- CVE-2019-14816: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173666).
- CVE-2019-14814: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173664).
- CVE-2019-14815: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173665).
- CVE-2019-14901: Fixed a heap overflow in the Marvell WiFi driver (bsc#1173661).
- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173100).
Patchnames
SUSE-2020-2491,SUSE-SLE-SAP-12-SP2-2020-2491,SUSE-SLE-SAP-12-SP3-2020-2496,SUSE-SLE-SERVER-12-SP2-2020-2491,SUSE-SLE-SERVER-12-SP3-2020-2496
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.180-94_103 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).\n- CVE-2019-0155: Fixed a privilege escalation in the i915 graphics driver (bsc#1173663).\n- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).\n- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).\n- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).\n- CVE-2019-19447: Fixed a use-after-free in ext4_put_super (bsc#1173869).\n- CVE-2019-18680: Fixed a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c (bsc#1173867).\n- CVE-2019-14816: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173666).\n- CVE-2019-14814: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173664).\n- CVE-2019-14815: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173665).\n- CVE-2019-14901: Fixed a heap overflow in the Marvell WiFi driver (bsc#1173661).\n- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173100).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2491,SUSE-SLE-SAP-12-SP2-2020-2491,SUSE-SLE-SAP-12-SP3-2020-2496,SUSE-SLE-SERVER-12-SP2-2020-2491,SUSE-SLE-SERVER-12-SP3-2020-2496", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2491-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2491-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202491-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2491-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" }, { "category": "self", "summary": "SUSE Bug 1173100", "url": "https://bugzilla.suse.com/1173100" }, { "category": "self", "summary": "SUSE Bug 1173659", "url": "https://bugzilla.suse.com/1173659" }, { "category": "self", "summary": "SUSE Bug 1173661", "url": "https://bugzilla.suse.com/1173661" }, { "category": "self", "summary": "SUSE Bug 1173663", "url": "https://bugzilla.suse.com/1173663" }, { "category": "self", "summary": "SUSE Bug 1173664", "url": "https://bugzilla.suse.com/1173664" }, { "category": "self", "summary": "SUSE Bug 1173665", "url": "https://bugzilla.suse.com/1173665" }, { "category": "self", "summary": "SUSE Bug 1173666", "url": "https://bugzilla.suse.com/1173666" }, { "category": "self", "summary": "SUSE Bug 1173867", "url": "https://bugzilla.suse.com/1173867" }, { "category": "self", "summary": "SUSE Bug 1173869", "url": "https://bugzilla.suse.com/1173869" }, { "category": "self", "summary": "SUSE Bug 1173942", "url": "https://bugzilla.suse.com/1173942" }, { "category": "self", "summary": "SUSE Bug 1173963", "url": "https://bugzilla.suse.com/1173963" }, { "category": "self", "summary": "SUSE Bug 1174247", "url": "https://bugzilla.suse.com/1174247" }, { "category": "self", "summary": "SUSE CVE CVE-2019-0155 page", "url": "https://www.suse.com/security/cve/CVE-2019-0155/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14814 page", "url": "https://www.suse.com/security/cve/CVE-2019-14814/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14815 page", "url": "https://www.suse.com/security/cve/CVE-2019-14815/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14816 page", "url": "https://www.suse.com/security/cve/CVE-2019-14816/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14895 page", "url": "https://www.suse.com/security/cve/CVE-2019-14895/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14901 page", "url": "https://www.suse.com/security/cve/CVE-2019-14901/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18680 page", "url": "https://www.suse.com/security/cve/CVE-2019-18680/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19447 page", "url": "https://www.suse.com/security/cve/CVE-2019-19447/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9458 page", "url": "https://www.suse.com/security/cve/CVE-2019-9458/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11668 page", "url": "https://www.suse.com/security/cve/CVE-2020-11668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" } ], "title": "Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3)", "tracking": { "current_release_date": "2020-09-04T11:29:20Z", "generator": { "date": "2020-09-04T11:29:20Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2491-1", "initial_release_date": "2020-09-04T11:29:20Z", "revision_history": [ { "date": "2020-09-04T11:29:20Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "product": { "name": "kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "product_id": "kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "product": { "name": "kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "product_id": "kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "product_id": "kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "product": { "name": "kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "product_id": "kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0155", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-0155" } ], "notes": [ { "category": "general", "text": "Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-0155", "url": "https://www.suse.com/security/cve/CVE-2019-0155" }, { "category": "external", "summary": "SUSE Bug 1135966 for CVE-2019-0155", "url": "https://bugzilla.suse.com/1135966" }, { "category": "external", "summary": "SUSE Bug 1135967 for CVE-2019-0155", "url": "https://bugzilla.suse.com/1135967" }, { "category": "external", "summary": "SUSE Bug 1173663 for CVE-2019-0155", "url": "https://bugzilla.suse.com/1173663" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:20Z", "details": "important" } ], "title": "CVE-2019-0155" }, { "cve": "CVE-2019-14814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14814" } ], "notes": [ { "category": "general", "text": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14814", "url": "https://www.suse.com/security/cve/CVE-2019-14814" }, { "category": "external", "summary": "SUSE Bug 1146512 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1146512" }, { "category": "external", "summary": "SUSE Bug 1173664 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173664" }, { "category": "external", "summary": "SUSE Bug 1173665 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:20Z", "details": "moderate" } ], "title": "CVE-2019-14814" }, { "cve": "CVE-2019-14815", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14815" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in Linux Kernel, where a Heap Overflow was found in mwifiex_set_wmm_params() function of Marvell Wifi Driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14815", "url": "https://www.suse.com/security/cve/CVE-2019-14815" }, { "category": "external", "summary": "SUSE Bug 1146514 for CVE-2019-14815", "url": "https://bugzilla.suse.com/1146514" }, { "category": "external", "summary": "SUSE Bug 1173665 for CVE-2019-14815", "url": "https://bugzilla.suse.com/1173665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:20Z", "details": "moderate" } ], "title": "CVE-2019-14815" }, { "cve": "CVE-2019-14816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14816" } ], "notes": [ { "category": "general", "text": "There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14816", "url": "https://www.suse.com/security/cve/CVE-2019-14816" }, { "category": "external", "summary": "SUSE Bug 1146516 for CVE-2019-14816", "url": "https://bugzilla.suse.com/1146516" }, { "category": "external", "summary": "SUSE Bug 1173666 for CVE-2019-14816", "url": "https://bugzilla.suse.com/1173666" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:20Z", "details": "moderate" } ], "title": "CVE-2019-14816" }, { "cve": "CVE-2019-14895", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14895" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14895", "url": "https://www.suse.com/security/cve/CVE-2019-14895" }, { "category": "external", "summary": "SUSE Bug 1157042 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1157042" }, { "category": "external", "summary": "SUSE Bug 1157158 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1157158" }, { "category": "external", "summary": "SUSE Bug 1173100 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1173100" }, { "category": "external", "summary": "SUSE Bug 1173660 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1173660" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:20Z", "details": "important" } ], "title": "CVE-2019-14895" }, { "cve": "CVE-2019-14901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14901" } ], "notes": [ { "category": "general", "text": "A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14901", "url": "https://www.suse.com/security/cve/CVE-2019-14901" }, { "category": "external", "summary": "SUSE Bug 1157042 for CVE-2019-14901", "url": "https://bugzilla.suse.com/1157042" }, { "category": "external", "summary": "SUSE Bug 1173661 for CVE-2019-14901", "url": "https://bugzilla.suse.com/1173661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:20Z", "details": "important" } ], "title": "CVE-2019-14901" }, { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:20Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2019-18680", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18680" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 4.4.x before 4.4.195. There is a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c that will cause denial of service, aka CID-91573ae4aed0.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18680", "url": "https://www.suse.com/security/cve/CVE-2019-18680" }, { "category": "external", "summary": "SUSE Bug 1155898 for CVE-2019-18680", "url": "https://bugzilla.suse.com/1155898" }, { "category": "external", "summary": "SUSE Bug 1173867 for CVE-2019-18680", "url": "https://bugzilla.suse.com/1173867" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:20Z", "details": "important" } ], "title": "CVE-2019-18680" }, { "cve": "CVE-2019-19447", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19447" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19447", "url": "https://www.suse.com/security/cve/CVE-2019-19447" }, { "category": "external", "summary": "SUSE Bug 1158819 for CVE-2019-19447", "url": "https://bugzilla.suse.com/1158819" }, { "category": "external", "summary": "SUSE Bug 1173869 for CVE-2019-19447", "url": "https://bugzilla.suse.com/1173869" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:20Z", "details": "important" } ], "title": "CVE-2019-19447" }, { "cve": "CVE-2019-9458", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9458" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9458", "url": "https://www.suse.com/security/cve/CVE-2019-9458" }, { "category": "external", "summary": "SUSE Bug 1168295 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1168295" }, { "category": "external", "summary": "SUSE Bug 1173963 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1173963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:20Z", "details": "important" } ], "title": "CVE-2019-9458" }, { "cve": "CVE-2020-11668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11668" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11668", "url": "https://www.suse.com/security/cve/CVE-2020-11668" }, { "category": "external", "summary": "SUSE Bug 1168952 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1168952" }, { "category": "external", "summary": "SUSE Bug 1173942 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1173942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:20Z", "details": "important" } ], "title": "CVE-2020-11668" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_103-default-9-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:20Z", "details": "important" } ], "title": "CVE-2020-14331" } ] }
suse-su-2020:2499-1
Vulnerability from csaf_suse
Published
2020-09-04 11:29
Modified
2020-09-04 11:29
Summary
Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3)
Description of the patch
This update for the Linux Kernel 4.4.180-94_116 fixes several issues.
The following security issues were fixed:
- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
Patchnames
SUSE-2020-2499,SUSE-SLE-SAP-12-SP2-2020-2493,SUSE-SLE-SAP-12-SP3-2020-2499,SUSE-SLE-SERVER-12-SP2-2020-2493,SUSE-SLE-SERVER-12-SP3-2020-2499
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.180-94_116 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).\n- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).\n- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2499,SUSE-SLE-SAP-12-SP2-2020-2493,SUSE-SLE-SAP-12-SP3-2020-2499,SUSE-SLE-SERVER-12-SP2-2020-2493,SUSE-SLE-SERVER-12-SP3-2020-2499", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2499-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2499-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202499-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2499-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007363.html" }, { "category": "self", "summary": "SUSE Bug 1173659", "url": "https://bugzilla.suse.com/1173659" }, { "category": "self", "summary": "SUSE Bug 1173942", "url": "https://bugzilla.suse.com/1173942" }, { "category": "self", "summary": "SUSE Bug 1174247", "url": "https://bugzilla.suse.com/1174247" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11668 page", "url": "https://www.suse.com/security/cve/CVE-2020-11668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" } ], "title": "Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3)", "tracking": { "current_release_date": "2020-09-04T11:29:54Z", "generator": { "date": "2020-09-04T11:29:54Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2499-1", "initial_release_date": "2020-09-04T11:29:54Z", "revision_history": [ { "date": "2020-09-04T11:29:54Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_180-94_116-default-3-2.2.ppc64le", "product": { "name": "kgraft-patch-4_4_180-94_116-default-3-2.2.ppc64le", "product_id": "kgraft-patch-4_4_180-94_116-default-3-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_129-default-4-2.2.ppc64le", "product": { "name": "kgraft-patch-4_4_121-92_129-default-4-2.2.ppc64le", "product_id": "kgraft-patch-4_4_121-92_129-default-4-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_180-94_116-default-3-2.2.x86_64", "product": { "name": "kgraft-patch-4_4_180-94_116-default-3-2.2.x86_64", "product_id": "kgraft-patch-4_4_180-94_116-default-3-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_129-default-4-2.2.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_129-default-4-2.2.x86_64", "product_id": "kgraft-patch-4_4_121-92_129-default-4-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_129-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_129-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_129-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_129-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_116-default-3-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-3-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_116-default-3-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_116-default-3-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-3-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_116-default-3-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_129-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_129-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_129-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_129-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_116-default-3-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-3-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_116-default-3-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_116-default-3-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-3-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_116-default-3-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-4-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-3-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-3-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-4-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-3-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-3-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-4-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-3-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-3-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-4-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-3-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-3-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-4-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-3-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-3-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-4-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-3-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-3-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:54Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2020-11668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11668" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-4-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-3-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-3-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-4-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-3-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-3-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11668", "url": "https://www.suse.com/security/cve/CVE-2020-11668" }, { "category": "external", "summary": "SUSE Bug 1168952 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1168952" }, { "category": "external", "summary": "SUSE Bug 1173942 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1173942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-4-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-3-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-3-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-4-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-3-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-3-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-4-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-3-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-3-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-4-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-3-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-3-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:54Z", "details": "important" } ], "title": "CVE-2020-11668" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-4-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-3-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-3-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-4-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-3-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-3-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-4-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-3-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-3-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-4-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-3-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-3-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-4-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-4-2.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-3-2.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-3-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-4-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-3-2.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-3-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:29:54Z", "details": "important" } ], "title": "CVE-2020-14331" } ] }
suse-su-2020:2513-1
Vulnerability from csaf_suse
Published
2020-09-04 11:33
Modified
2020-09-04 11:33
Summary
Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP1)
Description of the patch
This update for the Linux Kernel 4.12.14-197_29 fixes several issues.
The following security issues were fixed:
- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2020-15780: Fixed a lockdown bypass via injection of malicious ACPI tables via configfs (bsc#1174186).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).
- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).
- CVE-2019-19447: Fixed a use-after-free in ext4_put_super (bsc#1173869).
- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173100).
Patchnames
SUSE-2020-2513,SUSE-SLE-Live-Patching-12-SP5-2020-2513,SUSE-SLE-Module-Live-Patching-15-2020-2523,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2529
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-197_29 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).\n- CVE-2020-15780: Fixed a lockdown bypass via injection of malicious ACPI tables via configfs (bsc#1174186).\n- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).\n- CVE-2019-9458: Fixed a use-after-free in media/v4l (bsc#1173963).\n- CVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).\n- CVE-2019-19447: Fixed a use-after-free in ext4_put_super (bsc#1173869).\n- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi driver (bsc#1173100).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2513,SUSE-SLE-Live-Patching-12-SP5-2020-2513,SUSE-SLE-Module-Live-Patching-15-2020-2523,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2529", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2513-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2513-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202513-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2513-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" }, { "category": "self", "summary": "SUSE Bug 1173100", "url": "https://bugzilla.suse.com/1173100" }, { "category": "self", "summary": "SUSE Bug 1173659", "url": "https://bugzilla.suse.com/1173659" }, { "category": "self", "summary": "SUSE Bug 1173869", "url": "https://bugzilla.suse.com/1173869" }, { "category": "self", "summary": "SUSE Bug 1173942", "url": "https://bugzilla.suse.com/1173942" }, { "category": "self", "summary": "SUSE Bug 1173963", "url": "https://bugzilla.suse.com/1173963" }, { "category": "self", "summary": "SUSE Bug 1174186", "url": "https://bugzilla.suse.com/1174186" }, { "category": "self", "summary": "SUSE Bug 1174247", "url": "https://bugzilla.suse.com/1174247" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14895 page", "url": "https://www.suse.com/security/cve/CVE-2019-14895/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19447 page", "url": "https://www.suse.com/security/cve/CVE-2019-19447/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9458 page", "url": "https://www.suse.com/security/cve/CVE-2019-9458/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11668 page", "url": "https://www.suse.com/security/cve/CVE-2020-11668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" } ], "title": "Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP1)", "tracking": { "current_release_date": "2020-09-04T11:33:56Z", "generator": { "date": "2020-09-04T11:33:56Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2513-1", "initial_release_date": "2020-09-04T11:33:56Z", "revision_history": [ { "date": "2020-09-04T11:33:56Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_12-default-6-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_12-default-6-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_12-default-6-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_47-default-6-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_47-default-6-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_47-default-6-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_29-default-6-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_29-default-6-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_29-default-6-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_12-default-6-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_12-default-6-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_12-default-6-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_47-default-6-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_47-default-6-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-150_47-default-6-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_29-default-6-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_29-default-6-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-197_29-default-6-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_12-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_12-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_12-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_12-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_47-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_47-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_47-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_47-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_29-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_29-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_29-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_29-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-14895", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14895" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14895", "url": "https://www.suse.com/security/cve/CVE-2019-14895" }, { "category": "external", "summary": "SUSE Bug 1157042 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1157042" }, { "category": "external", "summary": "SUSE Bug 1157158 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1157158" }, { "category": "external", "summary": "SUSE Bug 1173100 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1173100" }, { "category": "external", "summary": "SUSE Bug 1173660 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1173660" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:56Z", "details": "important" } ], "title": "CVE-2019-14895" }, { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:56Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2019-19447", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19447" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19447", "url": "https://www.suse.com/security/cve/CVE-2019-19447" }, { "category": "external", "summary": "SUSE Bug 1158819 for CVE-2019-19447", "url": "https://bugzilla.suse.com/1158819" }, { "category": "external", "summary": "SUSE Bug 1173869 for CVE-2019-19447", "url": "https://bugzilla.suse.com/1173869" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:56Z", "details": "important" } ], "title": "CVE-2019-19447" }, { "cve": "CVE-2019-9458", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9458" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9458", "url": "https://www.suse.com/security/cve/CVE-2019-9458" }, { "category": "external", "summary": "SUSE Bug 1168295 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1168295" }, { "category": "external", "summary": "SUSE Bug 1173963 for CVE-2019-9458", "url": "https://bugzilla.suse.com/1173963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:56Z", "details": "important" } ], "title": "CVE-2019-9458" }, { "cve": "CVE-2020-11668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11668" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11668", "url": "https://www.suse.com/security/cve/CVE-2020-11668" }, { "category": "external", "summary": "SUSE Bug 1168952 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1168952" }, { "category": "external", "summary": "SUSE Bug 1173942 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1173942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:56Z", "details": "important" } ], "title": "CVE-2020-11668" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:56Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_12-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_29-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_47-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:33:56Z", "details": "important" } ], "title": "CVE-2020-15780" } ] }
suse-su-2020:2515-1
Vulnerability from csaf_suse
Published
2020-09-04 11:34
Modified
2020-09-04 11:34
Summary
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2)
Description of the patch
This update for the Linux Kernel 5.3.18-22 fixes several issues.
The following security issues were fixed:
- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2020-15780: Fixed a lockdown bypass via injection of malicious ACPI tables via configfs (bsc#1174186).
Patchnames
SUSE-2020-2515,SUSE-SLE-Live-Patching-12-SP5-2020-2515,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2532,SUSE-SLE-Module-Live-Patching-15-SP2-2020-2536
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-22 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).\n- CVE-2020-15780: Fixed a lockdown bypass via injection of malicious ACPI tables via configfs (bsc#1174186).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2515,SUSE-SLE-Live-Patching-12-SP5-2020-2515,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2532,SUSE-SLE-Module-Live-Patching-15-SP2-2020-2536", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2515-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2515-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202515-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2515-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007372.html" }, { "category": "self", "summary": "SUSE Bug 1174186", "url": "https://bugzilla.suse.com/1174186" }, { "category": "self", "summary": "SUSE Bug 1174247", "url": "https://bugzilla.suse.com/1174247" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" } ], "title": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2)", "tracking": { "current_release_date": "2020-09-04T11:34:46Z", "generator": { "date": "2020-09-04T11:34:46Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2515-1", "initial_release_date": "2020-09-04T11:34:46Z", "revision_history": [ { "date": "2020-09-04T11:34:46Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_20-default-4-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_20-default-4-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_20-default-4-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_40-default-4-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_40-default-4-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_40-default-4-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-22-default-2-5.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-22-default-2-5.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-22-default-2-5.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_20-default-4-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-122_20-default-4-2.2.s390x", "product_id": "kgraft-patch-4_12_14-122_20-default-4-2.2.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-22-default-2-5.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-22-default-2-5.2.s390x", "product_id": "kernel-livepatch-5_3_18-22-default-2-5.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_20-default-4-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_20-default-4-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_20-default-4-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_40-default-4-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_40-default-4-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-197_40-default-4-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-22-default-2-5.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-22-default-2-5.2.x86_64", "product_id": "kernel-livepatch-5_3_18-22-default-2-5.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-4-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-4-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-4-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_20-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_20-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_40-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-4-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_40-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_40-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-4-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_40-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-22-default-2-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-2-5.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-22-default-2-5.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-22-default-2-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-2-5.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-22-default-2-5.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-22-default-2-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-2-5.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-22-default-2-5.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-2-5.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-2-5.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-2-5.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-2-5.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-2-5.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-2-5.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-2-5.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-2-5.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-2-5.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:34:46Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-2-5.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-2-5.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-2-5.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-2-5.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-2-5.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-2-5.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_20-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_40-default-4-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-2-5.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-2-5.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-2-5.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:34:46Z", "details": "important" } ], "title": "CVE-2020-15780" } ] }
suse-su-2020:2102-1
Vulnerability from csaf_suse
Published
2020-07-31 13:44
Modified
2020-07-31 13:44
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-10781: Fixed a denial of service issue in the ZRAM implementation (bnc#1173074).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in bluetooth may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-14331: Fixed a buffer over write in vgacon_scrollback_update() (bnc#1174205).
The following non-security bugs were fixed:
- ACPICA: Dispatcher: add status checks (git-fixes).
- ACPI/IORT: Fix PMCG node single ID mapping handling (git-fixes).
- ACPI: video: Use native backlight on Acer Aspire 5783z (git-fixes).
- ACPI: video: Use native backlight on Acer TravelMate 5735Z (git-fixes).
- ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H and EKL (jsc#SLE-13261).
- ALSA: hda/realtek - change to suitable link model for ASUS platform (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (git-fixes).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (git-fixes).
- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (git-fixes).
- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (git-fixes).
- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (git-fixes).
- ALSA: hda/realtek - fixup for yet another Intel reference board (git-fixes).
- ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).
- ALSA: line6: Perform sanity check for each URB creation (git-fixes).
- ALSA: line6: Sync the pending work cancel at disconnection (git-fixes).
- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).
- ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).
- apparmor: ensure that dfa state tables have entries (git-fixes).
- apparmor: fix introspection of of task mode for unconfined tasks (git-fixes).
- apparmor: Fix memory leak of profile proxy (git-fixes).
- apparmor: Fix use-after-free in aa_audit_rule_init (git-fixes).
- apparmor: remove useless aafs_create_symlink (git-fixes).
- arm64: dts: ls1043a-rdb: correct RGMII delay mode to rgmii-id (bsc#1174398).
- arm64: dts: ls1046ardb: set RGMII interfaces to RGMII_ID mode (bsc#1174398).
- ASoC: codecs: max98373: Removed superfluous volume control from chip default (git-fixes).
- ASoc: codecs: max98373: remove Idle_bias_on to let codec suspend (git-fixes).
- ASoC: Intel: bytcht_es8316: Add missed put_device() (git-fixes).
- ASoC: rockchip: add format and rate constraints on rk3399 (git-fixes).
- ASoC: rt286: fix unexpected interrupt happens (git-fixes).
- ASoC: rt5670: Add new gpio1_is_ext_spk_en quirk and enable it on the Lenovo Miix 2 10 (git-fixes).
- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).
- ASoC: rt5670: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5682: Report the button event in the headset type only (git-fixes).
- ASoC: topology: fix kernel oops on route addition error (git-fixes).
- ASoC: topology: fix tlvs in error handling for widget_dmixer (git-fixes).
- ASoC: wm8974: fix Boost Mixer Aux Switch (git-fixes).
- ASoC: wm8974: remove unsupported clock mode (git-fixes).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).
- ath9k: Fix regression with Atheros 9271 (git-fixes).
- ax88172a: fix ax88172a_unbind() failures (git-fixes).
- blk-mq: consider non-idle request as 'inflight' in blk_mq_rq_inflight() (bsc#1165933).
- bnxt_en: Init ethtool link settings after reading updated PHY configuration (jsc#SLE-8371 bsc#1153274).
- bpf: Do not allow btf_ctx_access with __int128 types (bsc#1155518).
- brcmfmac: Transform compatible string for FW loading (bsc#1169771).
- bridge: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).
- bridge: mcast: Fix MLD2 Report IPv6 payload length check (git-fixes).
- btrfs: add assertions for tree == inode->io_tree to extent IO helpers (bsc#1174438).
- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).
- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).
- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).
- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).
- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).
- bus: ti-sysc: Do not disable on suspend for no-idle (git-fixes).
- dccp: Fix possible memleak in dccp_init and dccp_fini (networking-stable-20_06_16).
- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).
- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).
- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).
- dmaengine: dmatest: stop completed threads when running without set channel (git-fixes).
- dmaengine: dw: Initialize channel before each transfer (git-fixes).
- dmaengine: fsl-edma-common: correct DSIZE_32BYTE (git-fixes).
- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).
- dmaengine: imx-sdma: Fix: Remove 'always true' comparison (git-fixes).
- dmaengine: mcf-edma: Fix NULL pointer exception in mcf_edma_tx_handler (git-fixes).
- dmaengine: sh: usb-dmac: set tx_result parameters (git-fixes).
- dm: do not use waitqueue for request-based DM (bsc#1165933).
- dpaa_eth: FMan erratum A050385 workaround (bsc#1174396).
- dpaa_eth: Make dpaa_a050385_wa static (bsc#1174396).
- drm/amd/display: Use kfree() to free rgb_user in calculate_user_regamma_ramp() (git-fixes).
- drm/amdgpu/atomfirmware: fix vram_info fetching for renoir (git-fixes).
- drm/amdgpu: do not do soft recovery if gpu_recovery=0 (git-fixes).
- drm/amdgpu/sdma5: fix wptr overwritten in ->get_wptr() (git-fixes).
- drm/amdgpu: use %u rather than %d for sclk/mclk (git-fixes).
- drm/amd/powerplay: fix a crash when overclocking Vega M (bsc#1152472)
- drm/exynos: fix ref count leak in mic_pre_enable (git-fixes).
- drm/exynos: Properly propagate return value in drm_iommu_attach_device() (git-fixes).
- drm/i915/fbc: Fix fence_y_offset handling (bsc#1152489)
- drm/i915/gt: Ignore irq enabling on the virtual engines (git-fixes).
- drm/i915/gt: Only swap to a random sibling once upon creation (bsc#1152489)
- drm/i915: Move cec_notifier to intel_hdmi_connector_unregister, v2. (bsc#1152489)
- drm: mcde: Fix display initialization problem (git-fixes).
- drm/mediatek: Check plane visibility in atomic_update (git-fixes).
- drm/msm/dpu: allow initialization of encoder locks during encoder init (git-fixes).
- drm/msm: fix potential memleak in error branch (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (git-fixes).
- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (git-fixes).
- drm/radeon: fix double free (git-fixes).
- drm: sun4i: hdmi: Fix inverted HPD result (git-fixes).
- drm/sun4i: tcon: Separate quirks for tcon0 and tcon1 on A20 (git-fixes).
- drm/tegra: hub: Do not enable orphaned window group (git-fixes).
- exfat: add missing brelse() calls on error paths (git-fixes).
- exfat: fix incorrect update of stream entry in __exfat_truncate() (git-fixes).
- exfat: fix memory leak in exfat_parse_param() (git-fixes).
- exfat: move setting VOL_DIRTY over exfat_remove_entries() (git-fixes).
- fpga: dfl: fix bug in port reset handshake (git-fixes).
- fsl/fman: detect FMan erratum A050385 (bsc#1174396) Update arm64 config file
- fuse: copy_file_range should truncate cache (git-fixes).
- fuse: fix copy_file_range cache issues (git-fixes).
- geneve: fix an uninitialized value in geneve_changelink() (git-fixes).
- gpio: pca953x: disable regmap locking for automatic address incrementing (git-fixes).
- gpio: pca953x: Fix GPIO resource leak on Intel Galileo Gen 2 (git-fixes).
- gpio: pca953x: Override IRQ for one of the expanders on Galileo Gen 2 (git-fixes).
- gpu: host1x: Detach driver on unregister (git-fixes).
- habanalabs: increase timeout during reset (git-fixes).
- HID: logitech-hidpp: avoid repeated 'multiplier = ' log messages (git-fixes).
- HID: magicmouse: do not set up autorepeat (git-fixes).
- HID: quirks: Always poll Obins Anne Pro 2 keyboard (git-fixes).
- HID: quirks: Ignore Simply Automated UPB PIM (git-fixes).
- HID: quirks: Remove ITE 8595 entry from hid_have_special_driver (git-fixes).
- hippi: Fix a size used in a 'pci_free_consistent()' in an error handling path (git-fixes).
- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (git-fixes).
- hwrng: ks-sa - Fix runtime PM imbalance on error (git-fixes).
- i2c: eg20t: Load module automatically if ID matches (git-fixes).
- i2c: i2c-qcom-geni: Fix DMA transfer race (git-fixes).
- i2c: rcar: always clear ICSAR to avoid side effects (git-fixes).
- i40iw: Do an RCU lookup in i40iw_add_ipv4_addr (git-fixes).
- i40iw: Fix error handling in i40iw_manage_arp_cache() (git-fixes).
- i40iw: fix null pointer dereference on a null wqe pointer (git-fixes).
- i40iw: Report correct firmware version (git-fixes).
- IB/cma: Fix ports memory leak in cma_configfs (git-fixes).
- IB/core: Fix potential NULL pointer dereference in pkey cache (git-fixes).
- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Ensure pq is not left on waitlist (git-fixes).
- IB/hfi1: Fix another case where pq is left on waitlist (bsc#1174411).
- IB/hfi1: Fix memory leaks in sysfs registration and unregistration (git-fixes).
- IB/hfi1: Fix module use count flaw due to leftover module put calls (bsc#1174407).
- IB/hfi1, qib: Ensure RCU is locked when accessing list (git-fixes).
- IB/ipoib: Fix double free of skb in case of multicast traffic in CM mode (git-fixes).
- IB/mad: Fix use after free when destroying MAD agent (git-fixes).
- IB/mlx4: Test return value of calls to ib_get_cached_pkey (git-fixes).
- IB/mlx5: Fix 50G per lane indication (git-fixes).
- IB/mlx5: Fix DEVX support for MLX5_CMD_OP_INIT2INIT_QP command (git-fixes).
- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (git-fixes).
- IB/mlx5: Replace tunnel mpls capability bits for tunnel_offloads (git-fixes).
- IB/qib: Call kobject_put() when kobject_init_and_add() fails (git-fixes).
- IB/rdmavt: Always return ERR_PTR from rvt_create_mmap_info() (git-fixes).
- IB/sa: Resolv use-after-free in ib_nl_make_request() (git-fixes).
- ieee802154: fix one possible memleak in adf7242_probe (git-fixes).
- iio: adc: ad7780: Fix a resource handling path in 'ad7780_probe()' (git-fixes).
- iio: core: add missing IIO_MOD_H2/ETHANOL string identifiers (git-fixes).
- iio:health:afe4404 Fix timestamp alignment and prevent data leak (git-fixes).
- iio:humidity:hdc100x Fix alignment and data leak issues (git-fixes).
- iio:humidity:hts221 Fix alignment and data leak issues (git-fixes).
- iio:magnetometer:ak8974: Fix alignment and data leak issues (git-fixes).
- iio: magnetometer: ak8974: Fix runtime PM imbalance on error (git-fixes).
- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (git-fixes).
- iio:pressure:ms5611 Fix buffer element alignment (git-fixes).
- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (git-fixes).
- Input: elan_i2c - add more hardware ID for Lenovo laptops (git-fixes).
- Input: goodix - fix touch coordinates on Cube I15-TC (git-fixes).
- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (git-fixes).
- Input: mms114 - add extra compatible for mms345l (git-fixes).
- intel_th: Fix a NULL dereference when hub driver is not loaded (git-fixes).
- intel_th: pci: Add Emmitsburg PCH support (git-fixes).
- intel_th: pci: Add Jasper Lake CPU support (git-fixes).
- intel_th: pci: Add Tiger Lake PCH-H support (git-fixes).
- iommu/arm-smmu-v3: Do not reserve implementation defined register space (bsc#1174126).
- iommu/vt-d: Enable PCI ACS for platform opt in hint (bsc#1174127).
- iommu/vt-d: Update scalable mode paging structure coherency (bsc#1174128).
- ionic: centralize queue reset code (bsc#1167773).
- ionic: fix up filter locks and debug msgs (bsc#1167773).
- ionic: keep rss hash after fw update (bsc#1167773).
- ionic: update filter id after replay (bsc#1167773).
- ionic: update the queue count on open (bsc#1167773).
- ionic: use mutex to protect queue operations (bsc#1167773).
- ionic: use offset for ethtool regs data (bsc#1167773).
- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).
- keys: asymmetric: fix error return code in software_key_query() (git-fixes).
- KVM: nVMX: always update CR3 in VMCS (git-fixes).
- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).
- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).
- lib: Reduce user_access_begin() boundaries in strncpy_from_user() and strnlen_user() (bsc#1174331).
- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).
- mei: bus: do not clean driver pointer (git-fixes).
- mfd: intel-lpss: Add Intel Jasper Lake PCI IDs (jsc#SLE-12602).
- mlxsw: core: Fix wrong SFP EEPROM reading for upper pages 1-3 (bsc#1154488).
- mlxsw: core: Use different get_trend() callbacks for different thermal zones (networking-stable-20_06_10).
- mmc: meson-gx: limit segments to 1 when dram-access-quirk is needed (git-fixes).
- mmc: sdhci: do not enable card detect interrupt for gpio cd type (git-fixes).
- mm/mmap.c: close race between munmap() and expand_upwards()/downwards() (bsc#1174527).
- nbd: Fix memory leak in nbd_add_socket (git-fixes).
- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).
- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).
- netdevsim: fix unbalaced locking in nsim_create() (git-fixes).
- net: dsa: bcm_sf2: Fix node reference count (git-fixes).
- net_failover: fixed rollback in net_failover_open() (networking-stable-20_06_10).
- netfilter: ip6tables: Add a .pre_exit hook in all ip6table_foo.c (bsc#1171857).
- netfilter: ip6tables: Split ip6t_unregister_table() into pre_exit and exit helpers (bsc#1171857).
- netfilter: iptables: Add a .pre_exit hook in all iptable_foo.c (bsc#1171857).
- netfilter: iptables: Split ipt_unregister_table() into pre_exit and exit helpers (bsc#1171857).
- net: fsl/fman: treat all RGMII modes in memac_adjust_link() (bsc#1174398).
- net: hns3: check reset pending after FLR prepare (bsc#1154353).
- net: hns3: fix error handling for desc filling (git-fixes).
- net: hns3: fix for not calculating TX BD send size correctly (git-fixes).
- net: hns3: fix return value error when query MAC link status fail (git-fixes).
- net: ipv4: Fix wrong type conversion from hint to rt in ip_route_use_hint() (bsc#1154353).
- net: macb: call pm_runtime_put_sync on failure path (git-fixes).
- net/mlx5: drain health workqueue in case of driver load error (networking-stable-20_06_16).
- net/mlx5e: Fix CPU mapping after function reload to avoid aRFS RX crash (jsc#SLE-8464).
- net/mlx5e: Fix repeated XSK usage on one channel (networking-stable-20_06_16).
- net/mlx5e: Fix VXLAN configuration restore after function reload (jsc#SLE-8464).
- net/mlx5: Fix fatal error handling during device load (networking-stable-20_06_16).
- net: phy: realtek: add support for configuring the RX delay on RTL8211F (bsc#1174398).
- net/smc: fix restoring of fallback changes (git-fixes).
- net: stmmac: do not attach interface until resume finishes (bsc#1174072).
- net: stmmac: dwc-qos: avoid clk and reset for acpi device (bsc#1174072).
- net: stmmac: dwc-qos: use generic device api (bsc#1174072).
- net: stmmac: enable timestamp snapshot for required PTP packets in dwmac v5.10a (networking-stable-20_06_07).
- net: stmmac: platform: fix probe for ACPI devices (bsc#1174072).
- net/tls: fix encryption error checking (git-fixes).
- net/tls: free record only on encryption error (git-fixes).
- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).
- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).
- nfp: flower: fix used time of merge flow statistics (networking-stable-20_06_07).
- NFS: Fix interrupted slots by sending a solo SEQUENCE operation (bsc#1174264).
- NTB: Fix static check warning in perf_clear_test (git-fixes).
- NTB: Fix the default port and peer numbers for legacy drivers (git-fixes).
- ntb: hw: remove the code that sets the DMA mask (git-fixes).
- NTB: ntb_pingpong: Choose doorbells based on port number (git-fixes).
- NTB: ntb_test: Fix bug when counting remote files (git-fixes).
- NTB: ntb_tool: reading the link file should not end in a NULL byte (git-fixes).
- NTB: perf: Do not require one more memory window than number of peers (git-fixes).
- NTB: perf: Fix race condition when run with ntb_test (git-fixes).
- NTB: perf: Fix support for hardware that does not have port numbers (git-fixes).
- ntb_perf: pass correct struct device to dma_alloc_coherent (git-fixes).
- NTB: Revert the change to use the NTB device dev for DMA allocations (git-fixes).
- ntb_tool: pass correct struct device to dma_alloc_coherent (git-fixes).
- ovl: inode reference leak in ovl_is_inuse true case (git-fixes).
- padata: add separate cpuhp node for CPUHP_PADATA_DEAD (git-fixes).
- padata: kABI fixup for struct padata_instance splitting nodes (git-fixes).
- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).
- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).
- PCI/EDR: Log only ACPI_NOTIFY_DISCONNECT_RECOVER events (bsc#1174513).
- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201).
- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).
- percpu: Separate decrypted varaibles anytime encryption can be enabled (bsc#1174332).
- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).
- platform/x86: ISST: Increase timeout (bsc#1174185).
- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).
- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).
- powerpc/kasan: Fix issues by lowering KASAN_SHADOW_END (git-fixes).
- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).
- qed: suppress 'do not support RoCE & iWARP' flooding on HW init (git-fixes).
- qed: suppress false-positives interrupt error messages on HW init (git-fixes).
- RDMA/cm: Add missing locking around id.state in cm_dup_req_handler (git-fixes).
- RDMA/cma: Protect bind_list and listen_list while finding matching cm id (git-fixes).
- RDMA/cm: Fix an error check in cm_alloc_id_priv() (git-fixes).
- RDMA/cm: Fix checking for allowed duplicate listens (git-fixes).
- RDMA/cm: Fix ordering of xa_alloc_cyclic() in ib_create_cm_id() (git-fixes).
- RDMA/cm: Read id.state under lock when doing pr_debug() (git-fixes).
- RDMA/cm: Remove a race freeing timewait_info (git-fixes).
- RDMA/cm: Update num_paths in cma_resolve_iboe_route error flow (git-fixes).
- RDMA/core: Fix double destruction of uobject (git-fixes).
- RDMA/core: Fix double put of resource (git-fixes).
- RDMA/core: Fix missing error check on dev_set_name() (git-fixes).
- RDMA/core: Fix protection fault in ib_mr_pool_destroy (git-fixes).
- RDMA/core: Fix race between destroy and release FD object (git-fixes).
- RDMA/core: Fix race in rdma_alloc_commit_uobject() (git-fixes).
- RDMA/core: Prevent mixed use of FDs between shared ufiles (git-fixes).
- RDMA/counter: Query a counter before release (git-fixes).
- RDMA/efa: Set maximum pkeys device attribute (git-fixes).
- RDMA/hns: Bugfix for querying qkey (git-fixes).
- RDMA/hns: Fix cmdq parameter of querying pf timer resource (git-fixes).
- RDMA/iwcm: Fix iwcm work deallocation (git-fixes).
- RDMA/iw_cxgb4: Fix incorrect function parameters (git-fixes).
- RDMA/mad: Do not crash if the rdma device does not have a umad interface (git-fixes).
- RDMA/mad: Fix possible memory leak in ib_mad_post_receive_mads() (git-fixes).
- RDMA/mlx4: Initialize ib_spec on the stack (git-fixes).
- RDMA/mlx5: Add init2init as a modify command (git-fixes).
- RDMA/mlx5: Fix access to wrong pointer while performing flush due to error (git-fixes).
- RDMA/mlx5: Fix the number of hwcounters of a dynamic counter (git-fixes).
- RDMA/mlx5: Fix udata response upon SRQ creation (git-fixes).
- RDMA/mlx5: Prevent prefetch from racing with implicit destruction (jsc#SLE-8446).
- RDMA/mlx5: Set GRH fields in query QP on RoCE (git-fixes).
- RDMA/mlx5: Use xa_lock_irq when access to SRQ table (git-fixes).
- RDMA/mlx5: Verify that QP is created with RQ or SQ (git-fixes).
- RDMA/nldev: Fix crash when set a QP to a new counter but QPN is missing (git-fixes).
- RDMA/pvrdma: Fix missing pci disable in pvrdma_pci_probe() (git-fixes).
- RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (git-fixes).
- RDMA/rvt: Fix potential memory leak caused by rvt_alloc_rq (git-fixes).
- RDMA/rxe: Always return ERR_PTR from rxe_create_mmap_info() (git-fixes).
- RDMA/rxe: Fix configuration of atomic queue pair attributes (git-fixes).
- RDMA/rxe: Set default vendor ID (git-fixes).
- RDMA/rxe: Set sys_image_guid to be aligned with HW IB devices (git-fixes).
- RDMA/siw: Fix failure handling during device creation (git-fixes).
- RDMA/siw: Fix passive connection establishment (git-fixes).
- RDMA/siw: Fix pointer-to-int-cast warning in siw_rx_pbl() (git-fixes).
- RDMA/siw: Fix potential siw_mem refcnt leak in siw_fastreg_mr() (git-fixes).
- RDMA/siw: Fix reporting vendor_part_id (git-fixes).
- RDMA/siw: Fix setting active_mtu attribute (git-fixes).
- RDMA/siw: Fix setting active_{speed, width} attributes (git-fixes).
- RDMA/ucma: Put a lock around every call to the rdma_cm layer (git-fixes).
- RDMA/uverbs: Fix create WQ to use the given user handle (git-fixes).
- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (git-fixes).
- regmap: fix alignment issue (git-fixes).
- regmap: Fix memory leak from regmap_register_patch (git-fixes).
- Revert 'i2c: cadence: Fix the hold bit setting' (git-fixes).
- Revert 'RDMA/cma: Simplify rdma_resolve_addr() error flow' (git-fixes).
- Revert 'thermal: mediatek: fix register index error' (git-fixes).
- RMDA/cm: Fix missing ib_cm_destroy_id() in ib_cm_insert_listen() (git-fixes).
- rtnetlink: Fix memory(net_device) leak when ->newlink fails (bsc#1154353).
- rtnetlink: Fix memory(net_device) leak when ->newlink fails (git-fixes).
- s390: fix syscall_get_error for compat processes (git-fixes).
- s390/ism: fix error return code in ism_probe() (git-fixes).
- s390/kaslr: add support for R_390_JMP_SLOT relocation type (git-fixes).
- s390/pci: Fix s390_mmio_read/write with MIO (git-fixes).
- s390/qdio: consistently restore the IRQ handler (git-fixes).
- s390/qdio: put thinint indicator after early error (git-fixes).
- s390/qdio: tear down thinint indicator after early error (git-fixes).
- s390/qeth: fix error handling for isolation mode cmds (git-fixes).
- sched/fair: handle case of task_h_load() returning 0 (bnc#1155798 (CPU scheduler functional and performance backports)).
- scsi: libfc: free response frame from GPN_ID (bsc#1173849).
- scsi: libfc: Handling of extra kref (bsc#1173849).
- scsi: libfc: If PRLI rejected, move rport to PLOGI state (bsc#1173849).
- scsi: libfc: rport state move to PLOGI if all PRLI retry exhausted (bsc#1173849).
- scsi: libfc: Skip additional kref updating work event (bsc#1173849).
- scsi: ufs-bsg: Fix runtime PM imbalance on error (git-fixes).
- scsi: zfcp: Fix panic on ERP timeout for previously dismissed ERP action (git-fixes).
- selftests/net: in rxtimestamp getopt_long needs terminating null entry (networking-stable-20_06_16).
- selinux: fall back to ref-walk if audit is required (bsc#1174333).
- selinux: revert 'stop passing MAY_NOT_BLOCK to the AVC upon follow_link' (bsc#1174333).
- serial: 8250_tegra: Create Tegra specific 8250 driver (bsc#1173941).
- SMB3: Honor lease disabling for multiuser mounts (git-fixes).
- soundwire: intel: fix memory leak with devm_kasprintf (git-fixes).
- spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).
- spi: spidev: fix a race between spidev_release and spidev_remove (git-fixes).
- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (git-fixes).
- staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).
- staging: comedi: verify array index is correct before using it (git-fixes).
- SUNRPC dont update timeout value on connection reset (bsc#1174263).
- sunrpc: Fix gss_unwrap_resp_integ() again (bsc#1174116).
- tcp: md5: allow changing MD5 keys in all socket states (git-fixes).
- thermal/drivers: imx: Fix missing of_node_put() at probe time (git-fixes).
- thermal: int3403_thermal: Downgrade error message (git-fixes).
- tpm_crb: fix fTPM on AMD Zen+ CPUs (bsc#1174362).
- tpm_tis: extra chip->ops check on error path in tpm_tis_core_init (git-fixes).
- tty: hvc_console, fix crashes on parallel open/close (git-fixes).
- udp: Copy has_conns in reuseport_grow() (git-fixes).
- udp: Improve load balancing for SO_REUSEPORT (git-fixes).
- USB: c67x00: fix use after free in c67x00_giveback_urb (git-fixes).
- usb: chipidea: core: add wakeup support for extcon (git-fixes).
- usb: dwc2: Fix shutdown callback in platform (git-fixes).
- usb: dwc3: pci: Fix reference count leak in dwc3_pci_resume_work (git-fixes).
- usb: gadget: Fix issue with config_ep_by_speed function (git-fixes).
- usb: gadget: function: fix missing spinlock in f_uac1_legacy (git-fixes).
- usb: gadget: udc: atmel: fix uninitialized read in debug printk (git-fixes).
- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (git-fixes).
- usbnet: smsc95xx: Fix use-after-free after removal (git-fixes).
- USB: serial: ch341: add new Product ID for CH340 (git-fixes).
- USB: serial: cypress_m8: enable Simply Automated UPB PIM (git-fixes).
- USB: serial: iuu_phoenix: fix memory corruption (git-fixes).
- USB: serial: option: add GosunCn GM500 series (git-fixes).
- USB: serial: option: add Quectel EG95 LTE modem (git-fixes).
- usb: tegra: Fix allocation for the FPCI context (git-fixes).
- usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).
- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174129).
- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).
- virt: vbox: Fix guest capabilities mask check (git-fixes).
- virt: vbox: Fix VBGL_IOCTL_VMMDEV_REQUEST_BIG and _LOG req numbers to match upstream (git-fixes).
- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).
- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).
- watchdog: iTCO: Add support for Cannon Lake PCH iTCO (jsc#SLE-13202).
- workqueue: Remove unnecessary kfree() call in rcu_free_wq() (git-fixes).
- xfrm: fix a warning in xfrm_policy_insert_list (bsc#1174645).
Patchnames
SUSE-2020-2102,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2102
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-10781: Fixed a denial of service issue in the ZRAM implementation (bnc#1173074).\n- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in bluetooth may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n- CVE-2020-14331: Fixed a buffer over write in vgacon_scrollback_update() (bnc#1174205).\n\nThe following non-security bugs were fixed:\n\n- ACPICA: Dispatcher: add status checks (git-fixes).\n- ACPI/IORT: Fix PMCG node single ID mapping handling (git-fixes).\n- ACPI: video: Use native backlight on Acer Aspire 5783z (git-fixes).\n- ACPI: video: Use native backlight on Acer TravelMate 5735Z (git-fixes).\n- ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H and EKL (jsc#SLE-13261).\n- ALSA: hda/realtek - change to suitable link model for ASUS platform (git-fixes).\n- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (git-fixes).\n- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (git-fixes).\n- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (git-fixes).\n- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (git-fixes).\n- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (git-fixes).\n- ALSA: hda/realtek - fixup for yet another Intel reference board (git-fixes).\n- ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).\n- ALSA: line6: Perform sanity check for each URB creation (git-fixes).\n- ALSA: line6: Sync the pending work cancel at disconnection (git-fixes).\n- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).\n- ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).\n- apparmor: ensure that dfa state tables have entries (git-fixes).\n- apparmor: fix introspection of of task mode for unconfined tasks (git-fixes).\n- apparmor: Fix memory leak of profile proxy (git-fixes).\n- apparmor: Fix use-after-free in aa_audit_rule_init (git-fixes).\n- apparmor: remove useless aafs_create_symlink (git-fixes).\n- arm64: dts: ls1043a-rdb: correct RGMII delay mode to rgmii-id (bsc#1174398).\n- arm64: dts: ls1046ardb: set RGMII interfaces to RGMII_ID mode (bsc#1174398).\n- ASoC: codecs: max98373: Removed superfluous volume control from chip default (git-fixes).\n- ASoc: codecs: max98373: remove Idle_bias_on to let codec suspend (git-fixes).\n- ASoC: Intel: bytcht_es8316: Add missed put_device() (git-fixes).\n- ASoC: rockchip: add format and rate constraints on rk3399 (git-fixes).\n- ASoC: rt286: fix unexpected interrupt happens (git-fixes).\n- ASoC: rt5670: Add new gpio1_is_ext_spk_en quirk and enable it on the Lenovo Miix 2 10 (git-fixes).\n- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).\n- ASoC: rt5670: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).\n- ASoC: rt5682: Report the button event in the headset type only (git-fixes).\n- ASoC: topology: fix kernel oops on route addition error (git-fixes).\n- ASoC: topology: fix tlvs in error handling for widget_dmixer (git-fixes).\n- ASoC: wm8974: fix Boost Mixer Aux Switch (git-fixes).\n- ASoC: wm8974: remove unsupported clock mode (git-fixes).\n- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).\n- ath9k: Fix regression with Atheros 9271 (git-fixes).\n- ax88172a: fix ax88172a_unbind() failures (git-fixes).\n- blk-mq: consider non-idle request as \u0027inflight\u0027 in blk_mq_rq_inflight() (bsc#1165933).\n- bnxt_en: Init ethtool link settings after reading updated PHY configuration (jsc#SLE-8371 bsc#1153274).\n- bpf: Do not allow btf_ctx_access with __int128 types (bsc#1155518).\n- brcmfmac: Transform compatible string for FW loading (bsc#1169771).\n- bridge: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).\n- bridge: mcast: Fix MLD2 Report IPv6 payload length check (git-fixes).\n- btrfs: add assertions for tree == inode-\u003eio_tree to extent IO helpers (bsc#1174438).\n- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).\n- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).\n- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).\n- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).\n- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).\n- bus: ti-sysc: Do not disable on suspend for no-idle (git-fixes).\n- dccp: Fix possible memleak in dccp_init and dccp_fini (networking-stable-20_06_16).\n- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).\n- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).\n- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).\n- dmaengine: dmatest: stop completed threads when running without set channel (git-fixes).\n- dmaengine: dw: Initialize channel before each transfer (git-fixes).\n- dmaengine: fsl-edma-common: correct DSIZE_32BYTE (git-fixes).\n- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).\n- dmaengine: imx-sdma: Fix: Remove \u0027always true\u0027 comparison (git-fixes).\n- dmaengine: mcf-edma: Fix NULL pointer exception in mcf_edma_tx_handler (git-fixes).\n- dmaengine: sh: usb-dmac: set tx_result parameters (git-fixes).\n- dm: do not use waitqueue for request-based DM (bsc#1165933).\n- dpaa_eth: FMan erratum A050385 workaround (bsc#1174396).\n- dpaa_eth: Make dpaa_a050385_wa static (bsc#1174396).\n- drm/amd/display: Use kfree() to free rgb_user in calculate_user_regamma_ramp() (git-fixes).\n- drm/amdgpu/atomfirmware: fix vram_info fetching for renoir (git-fixes).\n- drm/amdgpu: do not do soft recovery if gpu_recovery=0 (git-fixes).\n- drm/amdgpu/sdma5: fix wptr overwritten in -\u003eget_wptr() (git-fixes).\n- drm/amdgpu: use %u rather than %d for sclk/mclk (git-fixes).\n- drm/amd/powerplay: fix a crash when overclocking Vega M (bsc#1152472)\n- drm/exynos: fix ref count leak in mic_pre_enable (git-fixes).\n- drm/exynos: Properly propagate return value in drm_iommu_attach_device() (git-fixes).\n- drm/i915/fbc: Fix fence_y_offset handling (bsc#1152489)\n- drm/i915/gt: Ignore irq enabling on the virtual engines (git-fixes).\n- drm/i915/gt: Only swap to a random sibling once upon creation (bsc#1152489)\n- drm/i915: Move cec_notifier to intel_hdmi_connector_unregister, v2. (bsc#1152489)\n- drm: mcde: Fix display initialization problem (git-fixes).\n- drm/mediatek: Check plane visibility in atomic_update (git-fixes).\n- drm/msm/dpu: allow initialization of encoder locks during encoder init (git-fixes).\n- drm/msm: fix potential memleak in error branch (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (git-fixes).\n- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (git-fixes).\n- drm/radeon: fix double free (git-fixes).\n- drm: sun4i: hdmi: Fix inverted HPD result (git-fixes).\n- drm/sun4i: tcon: Separate quirks for tcon0 and tcon1 on A20 (git-fixes).\n- drm/tegra: hub: Do not enable orphaned window group (git-fixes).\n- exfat: add missing brelse() calls on error paths (git-fixes).\n- exfat: fix incorrect update of stream entry in __exfat_truncate() (git-fixes).\n- exfat: fix memory leak in exfat_parse_param() (git-fixes).\n- exfat: move setting VOL_DIRTY over exfat_remove_entries() (git-fixes).\n- fpga: dfl: fix bug in port reset handshake (git-fixes).\n- fsl/fman: detect FMan erratum A050385 (bsc#1174396) Update arm64 config file\n- fuse: copy_file_range should truncate cache (git-fixes).\n- fuse: fix copy_file_range cache issues (git-fixes).\n- geneve: fix an uninitialized value in geneve_changelink() (git-fixes).\n- gpio: pca953x: disable regmap locking for automatic address incrementing (git-fixes).\n- gpio: pca953x: Fix GPIO resource leak on Intel Galileo Gen 2 (git-fixes).\n- gpio: pca953x: Override IRQ for one of the expanders on Galileo Gen 2 (git-fixes).\n- gpu: host1x: Detach driver on unregister (git-fixes).\n- habanalabs: increase timeout during reset (git-fixes).\n- HID: logitech-hidpp: avoid repeated \u0027multiplier = \u0027 log messages (git-fixes).\n- HID: magicmouse: do not set up autorepeat (git-fixes).\n- HID: quirks: Always poll Obins Anne Pro 2 keyboard (git-fixes).\n- HID: quirks: Ignore Simply Automated UPB PIM (git-fixes).\n- HID: quirks: Remove ITE 8595 entry from hid_have_special_driver (git-fixes).\n- hippi: Fix a size used in a \u0027pci_free_consistent()\u0027 in an error handling path (git-fixes).\n- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (git-fixes).\n- hwrng: ks-sa - Fix runtime PM imbalance on error (git-fixes).\n- i2c: eg20t: Load module automatically if ID matches (git-fixes).\n- i2c: i2c-qcom-geni: Fix DMA transfer race (git-fixes).\n- i2c: rcar: always clear ICSAR to avoid side effects (git-fixes).\n- i40iw: Do an RCU lookup in i40iw_add_ipv4_addr (git-fixes).\n- i40iw: Fix error handling in i40iw_manage_arp_cache() (git-fixes).\n- i40iw: fix null pointer dereference on a null wqe pointer (git-fixes).\n- i40iw: Report correct firmware version (git-fixes).\n- IB/cma: Fix ports memory leak in cma_configfs (git-fixes).\n- IB/core: Fix potential NULL pointer dereference in pkey cache (git-fixes).\n- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).\n- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).\n- IB/hfi1: Ensure pq is not left on waitlist (git-fixes).\n- IB/hfi1: Fix another case where pq is left on waitlist (bsc#1174411).\n- IB/hfi1: Fix memory leaks in sysfs registration and unregistration (git-fixes).\n- IB/hfi1: Fix module use count flaw due to leftover module put calls (bsc#1174407).\n- IB/hfi1, qib: Ensure RCU is locked when accessing list (git-fixes).\n- IB/ipoib: Fix double free of skb in case of multicast traffic in CM mode (git-fixes).\n- IB/mad: Fix use after free when destroying MAD agent (git-fixes).\n- IB/mlx4: Test return value of calls to ib_get_cached_pkey (git-fixes).\n- IB/mlx5: Fix 50G per lane indication (git-fixes).\n- IB/mlx5: Fix DEVX support for MLX5_CMD_OP_INIT2INIT_QP command (git-fixes).\n- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (git-fixes).\n- IB/mlx5: Replace tunnel mpls capability bits for tunnel_offloads (git-fixes).\n- IB/qib: Call kobject_put() when kobject_init_and_add() fails (git-fixes).\n- IB/rdmavt: Always return ERR_PTR from rvt_create_mmap_info() (git-fixes).\n- IB/sa: Resolv use-after-free in ib_nl_make_request() (git-fixes).\n- ieee802154: fix one possible memleak in adf7242_probe (git-fixes).\n- iio: adc: ad7780: Fix a resource handling path in \u0027ad7780_probe()\u0027 (git-fixes).\n- iio: core: add missing IIO_MOD_H2/ETHANOL string identifiers (git-fixes).\n- iio:health:afe4404 Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:humidity:hdc100x Fix alignment and data leak issues (git-fixes).\n- iio:humidity:hts221 Fix alignment and data leak issues (git-fixes).\n- iio:magnetometer:ak8974: Fix alignment and data leak issues (git-fixes).\n- iio: magnetometer: ak8974: Fix runtime PM imbalance on error (git-fixes).\n- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (git-fixes).\n- iio:pressure:ms5611 Fix buffer element alignment (git-fixes).\n- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (git-fixes).\n- Input: elan_i2c - add more hardware ID for Lenovo laptops (git-fixes).\n- Input: goodix - fix touch coordinates on Cube I15-TC (git-fixes).\n- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (git-fixes).\n- Input: mms114 - add extra compatible for mms345l (git-fixes).\n- intel_th: Fix a NULL dereference when hub driver is not loaded (git-fixes).\n- intel_th: pci: Add Emmitsburg PCH support (git-fixes).\n- intel_th: pci: Add Jasper Lake CPU support (git-fixes).\n- intel_th: pci: Add Tiger Lake PCH-H support (git-fixes).\n- iommu/arm-smmu-v3: Do not reserve implementation defined register space (bsc#1174126).\n- iommu/vt-d: Enable PCI ACS for platform opt in hint (bsc#1174127).\n- iommu/vt-d: Update scalable mode paging structure coherency (bsc#1174128).\n- ionic: centralize queue reset code (bsc#1167773).\n- ionic: fix up filter locks and debug msgs (bsc#1167773).\n- ionic: keep rss hash after fw update (bsc#1167773).\n- ionic: update filter id after replay (bsc#1167773).\n- ionic: update the queue count on open (bsc#1167773).\n- ionic: use mutex to protect queue operations (bsc#1167773).\n- ionic: use offset for ethtool regs data (bsc#1167773).\n- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).\n- keys: asymmetric: fix error return code in software_key_query() (git-fixes).\n- KVM: nVMX: always update CR3 in VMCS (git-fixes).\n- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).\n- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).\n- lib: Reduce user_access_begin() boundaries in strncpy_from_user() and strnlen_user() (bsc#1174331).\n- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).\n- mei: bus: do not clean driver pointer (git-fixes).\n- mfd: intel-lpss: Add Intel Jasper Lake PCI IDs (jsc#SLE-12602).\n- mlxsw: core: Fix wrong SFP EEPROM reading for upper pages 1-3 (bsc#1154488).\n- mlxsw: core: Use different get_trend() callbacks for different thermal zones (networking-stable-20_06_10).\n- mmc: meson-gx: limit segments to 1 when dram-access-quirk is needed (git-fixes).\n- mmc: sdhci: do not enable card detect interrupt for gpio cd type (git-fixes).\n- mm/mmap.c: close race between munmap() and expand_upwards()/downwards() (bsc#1174527).\n- nbd: Fix memory leak in nbd_add_socket (git-fixes).\n- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).\n- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).\n- netdevsim: fix unbalaced locking in nsim_create() (git-fixes).\n- net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n- net_failover: fixed rollback in net_failover_open() (networking-stable-20_06_10).\n- netfilter: ip6tables: Add a .pre_exit hook in all ip6table_foo.c (bsc#1171857).\n- netfilter: ip6tables: Split ip6t_unregister_table() into pre_exit and exit helpers (bsc#1171857).\n- netfilter: iptables: Add a .pre_exit hook in all iptable_foo.c (bsc#1171857).\n- netfilter: iptables: Split ipt_unregister_table() into pre_exit and exit helpers (bsc#1171857).\n- net: fsl/fman: treat all RGMII modes in memac_adjust_link() (bsc#1174398).\n- net: hns3: check reset pending after FLR prepare (bsc#1154353).\n- net: hns3: fix error handling for desc filling (git-fixes).\n- net: hns3: fix for not calculating TX BD send size correctly (git-fixes).\n- net: hns3: fix return value error when query MAC link status fail (git-fixes).\n- net: ipv4: Fix wrong type conversion from hint to rt in ip_route_use_hint() (bsc#1154353).\n- net: macb: call pm_runtime_put_sync on failure path (git-fixes).\n- net/mlx5: drain health workqueue in case of driver load error (networking-stable-20_06_16).\n- net/mlx5e: Fix CPU mapping after function reload to avoid aRFS RX crash (jsc#SLE-8464).\n- net/mlx5e: Fix repeated XSK usage on one channel (networking-stable-20_06_16).\n- net/mlx5e: Fix VXLAN configuration restore after function reload (jsc#SLE-8464).\n- net/mlx5: Fix fatal error handling during device load (networking-stable-20_06_16).\n- net: phy: realtek: add support for configuring the RX delay on RTL8211F (bsc#1174398).\n- net/smc: fix restoring of fallback changes (git-fixes).\n- net: stmmac: do not attach interface until resume finishes (bsc#1174072).\n- net: stmmac: dwc-qos: avoid clk and reset for acpi device (bsc#1174072).\n- net: stmmac: dwc-qos: use generic device api (bsc#1174072).\n- net: stmmac: enable timestamp snapshot for required PTP packets in dwmac v5.10a (networking-stable-20_06_07).\n- net: stmmac: platform: fix probe for ACPI devices (bsc#1174072).\n- net/tls: fix encryption error checking (git-fixes).\n- net/tls: free record only on encryption error (git-fixes).\n- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).\n- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).\n- nfp: flower: fix used time of merge flow statistics (networking-stable-20_06_07).\n- NFS: Fix interrupted slots by sending a solo SEQUENCE operation (bsc#1174264).\n- NTB: Fix static check warning in perf_clear_test (git-fixes).\n- NTB: Fix the default port and peer numbers for legacy drivers (git-fixes).\n- ntb: hw: remove the code that sets the DMA mask (git-fixes).\n- NTB: ntb_pingpong: Choose doorbells based on port number (git-fixes).\n- NTB: ntb_test: Fix bug when counting remote files (git-fixes).\n- NTB: ntb_tool: reading the link file should not end in a NULL byte (git-fixes).\n- NTB: perf: Do not require one more memory window than number of peers (git-fixes).\n- NTB: perf: Fix race condition when run with ntb_test (git-fixes).\n- NTB: perf: Fix support for hardware that does not have port numbers (git-fixes).\n- ntb_perf: pass correct struct device to dma_alloc_coherent (git-fixes).\n- NTB: Revert the change to use the NTB device dev for DMA allocations (git-fixes).\n- ntb_tool: pass correct struct device to dma_alloc_coherent (git-fixes).\n- ovl: inode reference leak in ovl_is_inuse true case (git-fixes).\n- padata: add separate cpuhp node for CPUHP_PADATA_DEAD (git-fixes).\n- padata: kABI fixup for struct padata_instance splitting nodes (git-fixes).\n- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).\n- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).\n- PCI/EDR: Log only ACPI_NOTIFY_DISCONNECT_RECOVER events (bsc#1174513).\n- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201).\n- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).\n- percpu: Separate decrypted varaibles anytime encryption can be enabled (bsc#1174332).\n- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).\n- platform/x86: ISST: Increase timeout (bsc#1174185).\n- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).\n- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).\n- powerpc/kasan: Fix issues by lowering KASAN_SHADOW_END (git-fixes).\n- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).\n- qed: suppress \u0027do not support RoCE \u0026 iWARP\u0027 flooding on HW init (git-fixes).\n- qed: suppress false-positives interrupt error messages on HW init (git-fixes).\n- RDMA/cm: Add missing locking around id.state in cm_dup_req_handler (git-fixes).\n- RDMA/cma: Protect bind_list and listen_list while finding matching cm id (git-fixes).\n- RDMA/cm: Fix an error check in cm_alloc_id_priv() (git-fixes).\n- RDMA/cm: Fix checking for allowed duplicate listens (git-fixes).\n- RDMA/cm: Fix ordering of xa_alloc_cyclic() in ib_create_cm_id() (git-fixes).\n- RDMA/cm: Read id.state under lock when doing pr_debug() (git-fixes).\n- RDMA/cm: Remove a race freeing timewait_info (git-fixes).\n- RDMA/cm: Update num_paths in cma_resolve_iboe_route error flow (git-fixes).\n- RDMA/core: Fix double destruction of uobject (git-fixes).\n- RDMA/core: Fix double put of resource (git-fixes).\n- RDMA/core: Fix missing error check on dev_set_name() (git-fixes).\n- RDMA/core: Fix protection fault in ib_mr_pool_destroy (git-fixes).\n- RDMA/core: Fix race between destroy and release FD object (git-fixes).\n- RDMA/core: Fix race in rdma_alloc_commit_uobject() (git-fixes).\n- RDMA/core: Prevent mixed use of FDs between shared ufiles (git-fixes).\n- RDMA/counter: Query a counter before release (git-fixes).\n- RDMA/efa: Set maximum pkeys device attribute (git-fixes).\n- RDMA/hns: Bugfix for querying qkey (git-fixes).\n- RDMA/hns: Fix cmdq parameter of querying pf timer resource (git-fixes).\n- RDMA/iwcm: Fix iwcm work deallocation (git-fixes).\n- RDMA/iw_cxgb4: Fix incorrect function parameters (git-fixes).\n- RDMA/mad: Do not crash if the rdma device does not have a umad interface (git-fixes).\n- RDMA/mad: Fix possible memory leak in ib_mad_post_receive_mads() (git-fixes).\n- RDMA/mlx4: Initialize ib_spec on the stack (git-fixes).\n- RDMA/mlx5: Add init2init as a modify command (git-fixes).\n- RDMA/mlx5: Fix access to wrong pointer while performing flush due to error (git-fixes).\n- RDMA/mlx5: Fix the number of hwcounters of a dynamic counter (git-fixes).\n- RDMA/mlx5: Fix udata response upon SRQ creation (git-fixes).\n- RDMA/mlx5: Prevent prefetch from racing with implicit destruction (jsc#SLE-8446).\n- RDMA/mlx5: Set GRH fields in query QP on RoCE (git-fixes).\n- RDMA/mlx5: Use xa_lock_irq when access to SRQ table (git-fixes).\n- RDMA/mlx5: Verify that QP is created with RQ or SQ (git-fixes).\n- RDMA/nldev: Fix crash when set a QP to a new counter but QPN is missing (git-fixes).\n- RDMA/pvrdma: Fix missing pci disable in pvrdma_pci_probe() (git-fixes).\n- RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (git-fixes).\n- RDMA/rvt: Fix potential memory leak caused by rvt_alloc_rq (git-fixes).\n- RDMA/rxe: Always return ERR_PTR from rxe_create_mmap_info() (git-fixes).\n- RDMA/rxe: Fix configuration of atomic queue pair attributes (git-fixes).\n- RDMA/rxe: Set default vendor ID (git-fixes).\n- RDMA/rxe: Set sys_image_guid to be aligned with HW IB devices (git-fixes).\n- RDMA/siw: Fix failure handling during device creation (git-fixes).\n- RDMA/siw: Fix passive connection establishment (git-fixes).\n- RDMA/siw: Fix pointer-to-int-cast warning in siw_rx_pbl() (git-fixes).\n- RDMA/siw: Fix potential siw_mem refcnt leak in siw_fastreg_mr() (git-fixes).\n- RDMA/siw: Fix reporting vendor_part_id (git-fixes).\n- RDMA/siw: Fix setting active_mtu attribute (git-fixes).\n- RDMA/siw: Fix setting active_{speed, width} attributes (git-fixes).\n- RDMA/ucma: Put a lock around every call to the rdma_cm layer (git-fixes).\n- RDMA/uverbs: Fix create WQ to use the given user handle (git-fixes).\n- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (git-fixes).\n- regmap: fix alignment issue (git-fixes).\n- regmap: Fix memory leak from regmap_register_patch (git-fixes).\n- Revert \u0027i2c: cadence: Fix the hold bit setting\u0027 (git-fixes).\n- Revert \u0027RDMA/cma: Simplify rdma_resolve_addr() error flow\u0027 (git-fixes).\n- Revert \u0027thermal: mediatek: fix register index error\u0027 (git-fixes).\n- RMDA/cm: Fix missing ib_cm_destroy_id() in ib_cm_insert_listen() (git-fixes).\n- rtnetlink: Fix memory(net_device) leak when -\u003enewlink fails (bsc#1154353).\n- rtnetlink: Fix memory(net_device) leak when -\u003enewlink fails (git-fixes).\n- s390: fix syscall_get_error for compat processes (git-fixes).\n- s390/ism: fix error return code in ism_probe() (git-fixes).\n- s390/kaslr: add support for R_390_JMP_SLOT relocation type (git-fixes).\n- s390/pci: Fix s390_mmio_read/write with MIO (git-fixes).\n- s390/qdio: consistently restore the IRQ handler (git-fixes).\n- s390/qdio: put thinint indicator after early error (git-fixes).\n- s390/qdio: tear down thinint indicator after early error (git-fixes).\n- s390/qeth: fix error handling for isolation mode cmds (git-fixes).\n- sched/fair: handle case of task_h_load() returning 0 (bnc#1155798 (CPU scheduler functional and performance backports)).\n- scsi: libfc: free response frame from GPN_ID (bsc#1173849).\n- scsi: libfc: Handling of extra kref (bsc#1173849).\n- scsi: libfc: If PRLI rejected, move rport to PLOGI state (bsc#1173849).\n- scsi: libfc: rport state move to PLOGI if all PRLI retry exhausted (bsc#1173849).\n- scsi: libfc: Skip additional kref updating work event (bsc#1173849).\n- scsi: ufs-bsg: Fix runtime PM imbalance on error (git-fixes).\n- scsi: zfcp: Fix panic on ERP timeout for previously dismissed ERP action (git-fixes).\n- selftests/net: in rxtimestamp getopt_long needs terminating null entry (networking-stable-20_06_16).\n- selinux: fall back to ref-walk if audit is required (bsc#1174333).\n- selinux: revert \u0027stop passing MAY_NOT_BLOCK to the AVC upon follow_link\u0027 (bsc#1174333).\n- serial: 8250_tegra: Create Tegra specific 8250 driver (bsc#1173941).\n- SMB3: Honor lease disabling for multiuser mounts (git-fixes).\n- soundwire: intel: fix memory leak with devm_kasprintf (git-fixes).\n- spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).\n- spi: spidev: fix a race between spidev_release and spidev_remove (git-fixes).\n- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (git-fixes).\n- staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).\n- staging: comedi: verify array index is correct before using it (git-fixes).\n- SUNRPC dont update timeout value on connection reset (bsc#1174263).\n- sunrpc: Fix gss_unwrap_resp_integ() again (bsc#1174116).\n- tcp: md5: allow changing MD5 keys in all socket states (git-fixes).\n- thermal/drivers: imx: Fix missing of_node_put() at probe time (git-fixes).\n- thermal: int3403_thermal: Downgrade error message (git-fixes).\n- tpm_crb: fix fTPM on AMD Zen+ CPUs (bsc#1174362).\n- tpm_tis: extra chip-\u003eops check on error path in tpm_tis_core_init (git-fixes).\n- tty: hvc_console, fix crashes on parallel open/close (git-fixes).\n- udp: Copy has_conns in reuseport_grow() (git-fixes).\n- udp: Improve load balancing for SO_REUSEPORT (git-fixes).\n- USB: c67x00: fix use after free in c67x00_giveback_urb (git-fixes).\n- usb: chipidea: core: add wakeup support for extcon (git-fixes).\n- usb: dwc2: Fix shutdown callback in platform (git-fixes).\n- usb: dwc3: pci: Fix reference count leak in dwc3_pci_resume_work (git-fixes).\n- usb: gadget: Fix issue with config_ep_by_speed function (git-fixes).\n- usb: gadget: function: fix missing spinlock in f_uac1_legacy (git-fixes).\n- usb: gadget: udc: atmel: fix uninitialized read in debug printk (git-fixes).\n- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (git-fixes).\n- usbnet: smsc95xx: Fix use-after-free after removal (git-fixes).\n- USB: serial: ch341: add new Product ID for CH340 (git-fixes).\n- USB: serial: cypress_m8: enable Simply Automated UPB PIM (git-fixes).\n- USB: serial: iuu_phoenix: fix memory corruption (git-fixes).\n- USB: serial: option: add GosunCn GM500 series (git-fixes).\n- USB: serial: option: add Quectel EG95 LTE modem (git-fixes).\n- usb: tegra: Fix allocation for the FPCI context (git-fixes).\n- usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).\n- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174129).\n- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).\n- virt: vbox: Fix guest capabilities mask check (git-fixes).\n- virt: vbox: Fix VBGL_IOCTL_VMMDEV_REQUEST_BIG and _LOG req numbers to match upstream (git-fixes).\n- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).\n- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).\n- watchdog: iTCO: Add support for Cannon Lake PCH iTCO (jsc#SLE-13202).\n- workqueue: Remove unnecessary kfree() call in rcu_free_wq() (git-fixes).\n- xfrm: fix a warning in xfrm_policy_insert_list (bsc#1174645).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2102,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2102", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2102-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2102-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202102-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2102-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-July/007207.html" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1152472", "url": "https://bugzilla.suse.com/1152472" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1153274", "url": "https://bugzilla.suse.com/1153274" }, { "category": "self", "summary": "SUSE Bug 1154353", "url": "https://bugzilla.suse.com/1154353" }, { "category": "self", "summary": "SUSE Bug 1154488", "url": "https://bugzilla.suse.com/1154488" }, { "category": "self", "summary": "SUSE Bug 1155518", "url": "https://bugzilla.suse.com/1155518" }, { "category": "self", "summary": "SUSE Bug 1155798", "url": "https://bugzilla.suse.com/1155798" }, { "category": "self", "summary": "SUSE Bug 1165933", "url": "https://bugzilla.suse.com/1165933" }, { "category": "self", "summary": "SUSE Bug 1167773", "url": "https://bugzilla.suse.com/1167773" }, { "category": "self", "summary": "SUSE Bug 1168959", "url": "https://bugzilla.suse.com/1168959" }, { "category": "self", "summary": "SUSE Bug 1169771", "url": "https://bugzilla.suse.com/1169771" }, { "category": "self", "summary": "SUSE Bug 1171857", "url": "https://bugzilla.suse.com/1171857" }, { "category": "self", "summary": "SUSE Bug 1171988", "url": "https://bugzilla.suse.com/1171988" }, { "category": "self", "summary": "SUSE Bug 1172201", "url": "https://bugzilla.suse.com/1172201" }, { "category": "self", "summary": "SUSE Bug 1173074", "url": "https://bugzilla.suse.com/1173074" }, { "category": "self", "summary": "SUSE Bug 1173849", "url": "https://bugzilla.suse.com/1173849" }, { "category": "self", "summary": "SUSE Bug 1173941", "url": "https://bugzilla.suse.com/1173941" }, { "category": "self", "summary": "SUSE Bug 1174072", "url": "https://bugzilla.suse.com/1174072" }, { "category": "self", "summary": "SUSE Bug 1174116", "url": "https://bugzilla.suse.com/1174116" }, { "category": "self", "summary": "SUSE Bug 1174126", "url": "https://bugzilla.suse.com/1174126" }, { "category": "self", "summary": "SUSE Bug 1174127", "url": "https://bugzilla.suse.com/1174127" }, { "category": "self", "summary": "SUSE Bug 1174128", "url": "https://bugzilla.suse.com/1174128" }, { "category": "self", "summary": "SUSE Bug 1174129", "url": "https://bugzilla.suse.com/1174129" }, { "category": "self", "summary": "SUSE Bug 1174185", "url": "https://bugzilla.suse.com/1174185" }, { "category": "self", "summary": "SUSE Bug 1174205", "url": "https://bugzilla.suse.com/1174205" }, { "category": "self", "summary": "SUSE Bug 1174247", "url": "https://bugzilla.suse.com/1174247" }, { "category": "self", "summary": "SUSE Bug 1174263", "url": "https://bugzilla.suse.com/1174263" }, { "category": "self", "summary": "SUSE Bug 1174264", "url": "https://bugzilla.suse.com/1174264" }, { "category": "self", "summary": "SUSE Bug 1174331", "url": "https://bugzilla.suse.com/1174331" }, { "category": "self", "summary": "SUSE Bug 1174332", "url": "https://bugzilla.suse.com/1174332" }, { "category": "self", "summary": "SUSE Bug 1174333", "url": "https://bugzilla.suse.com/1174333" }, { "category": "self", "summary": "SUSE Bug 1174356", "url": "https://bugzilla.suse.com/1174356" }, { "category": "self", "summary": "SUSE Bug 1174362", "url": "https://bugzilla.suse.com/1174362" }, { "category": "self", "summary": "SUSE Bug 1174396", "url": "https://bugzilla.suse.com/1174396" }, { "category": "self", "summary": "SUSE Bug 1174398", "url": "https://bugzilla.suse.com/1174398" }, { "category": "self", "summary": "SUSE Bug 1174407", "url": "https://bugzilla.suse.com/1174407" }, { "category": "self", "summary": "SUSE Bug 1174409", "url": "https://bugzilla.suse.com/1174409" }, { "category": "self", "summary": "SUSE Bug 1174411", "url": "https://bugzilla.suse.com/1174411" }, { "category": "self", "summary": "SUSE Bug 1174438", "url": "https://bugzilla.suse.com/1174438" }, { "category": "self", "summary": "SUSE Bug 1174462", "url": "https://bugzilla.suse.com/1174462" }, { "category": "self", "summary": "SUSE Bug 1174513", "url": "https://bugzilla.suse.com/1174513" }, { "category": "self", "summary": "SUSE Bug 1174527", "url": "https://bugzilla.suse.com/1174527" }, { "category": "self", "summary": "SUSE Bug 1174627", "url": "https://bugzilla.suse.com/1174627" }, { "category": "self", "summary": "SUSE Bug 1174645", "url": "https://bugzilla.suse.com/1174645" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0305 page", "url": "https://www.suse.com/security/cve/CVE-2020-0305/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10781 page", "url": "https://www.suse.com/security/cve/CVE-2020-10781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-07-31T13:44:06Z", "generator": { "date": "2020-07-31T13:44:06Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2102-1", "initial_release_date": "2020-07-31T13:44:06Z", "revision_history": [ { "date": "2020-07-31T13:44:06Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-5.3.18-18.12.1.noarch", "product": { "name": "kernel-devel-azure-5.3.18-18.12.1.noarch", "product_id": "kernel-devel-azure-5.3.18-18.12.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-5.3.18-18.12.1.noarch", "product": { "name": "kernel-source-azure-5.3.18-18.12.1.noarch", "product_id": "kernel-source-azure-5.3.18-18.12.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-5.3.18-18.12.1.x86_64", "product": { "name": "cluster-md-kmp-azure-5.3.18-18.12.1.x86_64", "product_id": "cluster-md-kmp-azure-5.3.18-18.12.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-5.3.18-18.12.1.x86_64", "product": { "name": "dlm-kmp-azure-5.3.18-18.12.1.x86_64", "product_id": "dlm-kmp-azure-5.3.18-18.12.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-5.3.18-18.12.1.x86_64", "product": { "name": "gfs2-kmp-azure-5.3.18-18.12.1.x86_64", "product_id": "gfs2-kmp-azure-5.3.18-18.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-5.3.18-18.12.1.x86_64", "product": { "name": "kernel-azure-5.3.18-18.12.1.x86_64", "product_id": "kernel-azure-5.3.18-18.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-5.3.18-18.12.1.x86_64", "product": { "name": "kernel-azure-devel-5.3.18-18.12.1.x86_64", "product_id": "kernel-azure-devel-5.3.18-18.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-5.3.18-18.12.1.x86_64", "product": { "name": "kernel-azure-extra-5.3.18-18.12.1.x86_64", "product_id": "kernel-azure-extra-5.3.18-18.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-devel-5.3.18-18.12.1.x86_64", "product": { "name": "kernel-azure-livepatch-devel-5.3.18-18.12.1.x86_64", "product_id": "kernel-azure-livepatch-devel-5.3.18-18.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-5.3.18-18.12.1.x86_64", "product": { "name": "kernel-syms-azure-5.3.18-18.12.1.x86_64", "product_id": "kernel-syms-azure-5.3.18-18.12.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-5.3.18-18.12.1.x86_64", "product": { "name": "kselftests-kmp-azure-5.3.18-18.12.1.x86_64", "product_id": "kselftests-kmp-azure-5.3.18-18.12.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-5.3.18-18.12.1.x86_64", "product": { "name": "ocfs2-kmp-azure-5.3.18-18.12.1.x86_64", "product_id": "ocfs2-kmp-azure-5.3.18-18.12.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-5.3.18-18.12.1.x86_64", "product": { "name": "reiserfs-kmp-azure-5.3.18-18.12.1.x86_64", "product_id": "reiserfs-kmp-azure-5.3.18-18.12.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-5.3.18-18.12.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.12.1.x86_64" }, "product_reference": "kernel-azure-5.3.18-18.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-5.3.18-18.12.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.12.1.x86_64" }, "product_reference": "kernel-azure-devel-5.3.18-18.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-5.3.18-18.12.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.12.1.noarch" }, "product_reference": "kernel-devel-azure-5.3.18-18.12.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-5.3.18-18.12.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.12.1.noarch" }, "product_reference": "kernel-source-azure-5.3.18-18.12.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-5.3.18-18.12.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.12.1.x86_64" }, "product_reference": "kernel-syms-azure-5.3.18-18.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0305" } ], "notes": [ { "category": "general", "text": "In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.12.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.12.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.12.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.12.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0305", "url": "https://www.suse.com/security/cve/CVE-2020-0305" }, { "category": "external", "summary": "SUSE Bug 1174462 for CVE-2020-0305", "url": "https://bugzilla.suse.com/1174462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.12.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.12.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.12.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.12.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.12.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.12.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.12.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.12.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-31T13:44:06Z", "details": "moderate" } ], "title": "CVE-2020-0305" }, { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.12.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.12.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.12.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.12.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.12.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.12.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.12.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.12.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.12.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.12.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.12.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.12.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-31T13:44:06Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-10781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10781" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.12.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.12.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.12.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.12.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10781", "url": "https://www.suse.com/security/cve/CVE-2020-10781" }, { "category": "external", "summary": "SUSE Bug 1173074 for CVE-2020-10781", "url": "https://bugzilla.suse.com/1173074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.12.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.12.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.12.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.12.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.12.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.12.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.12.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.12.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-31T13:44:06Z", "details": "moderate" } ], "title": "CVE-2020-10781" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.12.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.12.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.12.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.12.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.12.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.12.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.12.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.12.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.12.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.12.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.12.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.12.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-31T13:44:06Z", "details": "important" } ], "title": "CVE-2020-14331" } ] }
suse-su-2020:2122-1
Vulnerability from csaf_suse
Published
2020-08-04 18:10
Modified
2020-08-04 18:10
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-14331: A buffer over write in vgacon_scroll was fixed (bnc#1174205).
- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).
- CVE-2020-10781: zram sysfs resource consumption was fixed (bnc#1173074).
- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).
- CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a memory leak, aka CID-28ebeb8db770 (bnc#1173514).
- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2019-16746: net/wireless/nl80211.c did not check the length of variable elements in a beacon head, leading to a buffer overflow (bnc#1152107).
- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).
- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).
- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).
- CVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
The following non-security bugs were fixed:
- ACPI: GED: add support for _Exx / _Lxx handler methods (bsc#1111666).
- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (bsc#1111666).
- ACPI: NFIT: Fix unlock on error in scrub_show() (bsc#1171753).
- ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).
- ACPI: video: Use native backlight on Acer Aspire 5783z (bsc#1111666).
- ACPI: video: Use native backlight on Acer TravelMate 5735Z (bsc#1111666).
- ALSA: hda - let hs_mic be picked ahead of hp_mic (bsc#1111666).
- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (bsc#1111666).
- ALSA: lx6464es - add support for LX6464ESe pci express variant (bsc#1111666).
- ALSA: opl3: fix infoleak in opl3 (bsc#1111666).
- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (bsc#1111666).
- ALSA: usb-audio: Fix packet size calculation (bsc#1111666).
- ALSA: usb-audio: Improve frames size computation (bsc#1111666).
- amdgpu: a NULL ->mm does not mean a thread is a kthread (git-fixes).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (bsc#1111666).
- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (bsc#1111666).
- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (bsc#1111666).
- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (bsc#1111666).
- ax25: fix setsockopt(SO_BINDTODEVICE) (networking-stable-20_05_27).
- b43: Fix connection problem with WPA3 (bsc#1111666).
- b43_legacy: Fix connection problem with WPA3 (bsc#1111666).
- be2net: fix link failure after ethtool offline test (git-fixes).
- block, bfq: add requeue-request hook (bsc#1104967 bsc#1171673).
- block, bfq: postpone rq preparation to insert or merge (bsc#1104967 bsc#1171673). Refresh patches.suse/block-bfq-fix-use-after-free-in-bfq_idle_slice_timer.patch
- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).
- Bluetooth: Add SCO fallback for invalid LMP parameters error (bsc#1111666).
- bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).
- bnxt_en: Fix ethtool selftest crash under error conditions (git-fixes).
- bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE cmd fails (git-fixes).
- bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).
- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (git-fixes).
- bnxt_en: Fix VF anti-spoof filter setup (networking-stable-20_05_12).
- bnxt_en: Fix VLAN acceleration handling in bnxt_fix_features() (networking-stable-20_05_12).
- bnxt_en: Improve AER slot reset (networking-stable-20_05_12).
- brcmfmac: Transform compatible string for FW loading (bsc#1169771).
- btrfs: add assertions for tree == inode->io_tree to extent IO helpers (bsc#1174438).
- btrfs: add new helper btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: Always use a cached extent_state in btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: always wait on ordered extents at fsync time (bsc#1171761).
- btrfs: clean up the left over logged_list usage (bsc#1171761).
- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: fix extent_state leak in btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).
- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).
- btrfs: fix list_add corruption and soft lockups in fsync (bsc#1171761).
- btrfs: fix missing data checksums after a ranged fsync (msync) (bsc#1171761).
- btrfs: fix missing file extent item for hole after ranged fsync (bsc#1171761).
- btrfs: fix missing hole after hole punching and fsync when using NO_HOLES (bsc#1171761).
- btrfs: fix missing semaphore unlock in btrfs_sync_file (bsc#1171761).
- btrfs: fix rare chances for data loss when doing a fast fsync (bsc#1171761).
- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).
- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).
- btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).
- btrfs: Remove extra parentheses from condition in copy_items() (bsc#1171761).
- btrfs: remove no longer used io_err from btrfs_log_ctx (bsc#1171761).
- btrfs: remove no longer used logged range variables when logging extents (bsc#1171761).
- btrfs: remove no longer used 'sync' member from transaction handle (bsc#1171761).
- btrfs: remove remaing full_sync logic from btrfs_sync_file (bsc#1171761).
- btrfs: remove the logged extents infrastructure (bsc#1171761).
- btrfs: remove the wait ordered logic in the log_one_extent path (bsc#1171761).
- btrfs: Return EAGAIN if we can't start no snpashot write in check_can_nocow (bsc#1174438).
- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).
- btrfs: Use newly introduced btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).
- bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads (bsc#1111666).
- carl9170: remove P2P_GO support (bsc#1111666).
- ceph: convert mdsc->cap_dirty to a per-session list (bsc#1167104).
- ceph: request expedited service on session's last cap flush (bsc#1167104).
- cgroup, blkcg: Prepare some symbols for module and !CONFIG_CGROUP usages (bsc#1173857).
- clocksource: dw_apb_timer: Make CPU-affiliation being optional (bsc#1111666).
- crypto: algboss - do not wait during notifier callback (bsc#1111666).
- crypto: algif_skcipher - Cap recv SG list at ctx->used (bsc#1111666).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (bsc#1111666).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).
- crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).
- crypto: talitos - fix IPsec cipher in length (git-fixes).
- crypto: talitos - reorder code in talitos_edesc_alloc() (git-fixes).
- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).
- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).
- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).
- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).
- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).
- driver-core, libnvdimm: Let device subsystems add local lockdep coverage (bsc#1171753).
- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617, bsc#1170618).
- drm: bridge: adv7511: Extend list of audio sample rates (bsc#1111666).
- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1113956) * context changes
- drm: encoder_slave: fix refcouting error for modules (bsc#1111666).
- drm: encoder_slave: fix refcouting error for modules (bsc#1114279)
- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1112178)
- drm/mediatek: Check plane visibility in atomic_update (bsc#1113956) * context changes
- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1111666).
- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (bsc#1111666).
- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (bsc#1111666).
- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1113956)
- drm/radeon: fix double free (bsc#1113956)
- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1113956)
- drm/sun4i: hdmi ddc clk: Fix size of m divider (bsc#1111666).
- drm/tegra: hub: Do not enable orphaned window group (bsc#1111666).
- drm/vkms: Hold gem object while still in-use (bsc#1113956) * context changes
- e1000: Distribute switch variables for initialization (bsc#1111666).
- e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).
- e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).
- e1000e: Relax condition to trigger reset for ME workaround (bsc#1111666).
- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).
- ext4: fix a data race at inode->i_blocks (bsc#1171835).
- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).
- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).
- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).
- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).
- Fix boot crash with MD (bsc#1174343) Refresh patches.suse/mdraid-fix-read-write-bytes-accounting.patch
- fix multiplication overflow in copy_fdtable() (bsc#1173825).
- Fix Patch-mainline tag in the previous zram fix patch
- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).
- gpu: host1x: Detach driver on unregister (bsc#1111666).
- HID: magicmouse: do not set up autorepeat (git-fixes).
- hv_netvsc: Fix netvsc_start_xmit's return type (git-fixes).
- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (bsc#1111666).
- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (bsc#1111666).
- hwmon: (max6697) Make sure the OVERT mask is set correctly (bsc#1111666).
- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (bsc#1111666).
- i2c: eg20t: Load module automatically if ID matches (bsc#1111666).
- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (bsc#1111666).
- i40e: reduce stack usage in i40e_set_fc (git-fixes).
- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).
- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- iio:health:afe4404 Fix timestamp alignment and prevent data leak (bsc#1111666).
- iio:humidity:hdc100x Fix alignment and data leak issues (bsc#1111666).
- iio:magnetometer:ak8974: Fix alignment and data leak issues (bsc#1111666).
- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (bsc#1111666).
- iio:pressure:ms5611 Fix buffer element alignment (bsc#1111666).
- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (bsc#1111666).
- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (bsc#1111666).
- input: i8042 - Remove special PowerPC handling (git-fixes).
- Input: synaptics - add a second working PNP_ID for Lenovo T470s (bsc#1111666).
- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).
- intel_th: Fix a NULL dereference when hub driver is not loaded (bsc#1111666).
- iommu/vt-d: Enable PCI ACS for platform opt in hint (bsc#1174130).
- ipvlan: call dev_change_flags when ipvlan mode is reset (git-fixes).
- ixgbevf: Remove limit of 10 entries for unicast filter list (git-fixes).
- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).
- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).
- kabi: hv: prevent struct device_node to become defined (bsc#1172871).
- kABI: protect struct mlx5_cmd_work_ent (kabi).
- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).
- kernfs: fix barrier usage in __kernfs_new_node() (bsc#1111666).
- KVM: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).
- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).
- KVM: x86: Fix APIC page invalidation race (bsc#1174122).
- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).
- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).
- libceph: do not omit recovery_deletes in target_copy() (bsc#1173462).
- libceph: do not omit recovery_deletes in target_copy() (bsc#1174113).
- libceph: ignore pool overlay and cache logic on redirects (bsc#1173146).
- libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA deadlock (bsc#1171753).
- libnvdimm/bus: Prepare the nd_ioctl() path to be re-entrant (bsc#1171753).
- libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over __nd_ioctl() (bsc#1171753).
- libnvdimm: cover up changes in struct nvdimm_bus (bsc#1171753).
- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).
- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).
- libnvdimm/label: Remove the dpa align check (bsc#1171759).
- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).
- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).
- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).
- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).
- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).
- libnvdimm/region: Initialize bad block for volatile namespaces (bnc#1151927 5.3.6).
- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).
- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).
- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).
- lpfc_debugfs: get rid of pointless access_ok() (bsc#1172687 bsc#1171530).
- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).
- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).
- media: si2157: Better check for running tuner in init (bsc#1111666).
- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered workqueue (git-fixes).
- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw workqueue (git-fixes).
- mlxsw: pci: Return error on PCI reset timeout (git-fixes).
- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).
- mlxsw: spectrum: Disallow prio-tagged packets when PVID is removed (git-fixes).
- mlxsw: spectrum_dpipe: Add missing error path (git-fixes).
- mlxsw: spectrum: Prevent force of 56G (git-fixes).
- mlxsw: spectrum_router: Refresh nexthop neighbour when it becomes dead (git-fixes).
- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (git-fixes).
- mlxsw: spectrum_switchdev: Add MDB entries in prepare phase (git-fixes).
- mlxsw: spectrum_switchdev: Do not treat static FDB entries as sticky (git-fixes).
- mmc: sdhci: do not enable card detect interrupt for gpio cd type (bsc#1111666).
- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (bsc#1111666).
- mvpp2: remove misleading comment (git-fixes).
- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).
- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).
- net/cxgb4: Check the return from t4_query_params properly (git-fixes).
- net: dsa: bcm_sf2: Fix node reference count (git-fixes).
- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).
- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).
- net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it (git-fixes).
- net: ena: add missing ethtool TX timestamping indication (git-fixes).
- net: ena: avoid memory access violation by validating req_id properly (git-fixes).
- net: ena: do not wake up tx queue when down (git-fixes).
- net: ena: ena-com.c: prevent NULL pointer dereference (git-fixes).
- net: ena: ethtool: use correct value for crc32 hash (git-fixes).
- net: ena: fix continuous keep-alive resets (git-fixes).
- net: ena: fix corruption of dev_idx_to_host_tbl (git-fixes).
- net: ena: fix default tx interrupt moderation interval (git-fixes).
- net: ena: fix incorrect default RSS key (git-fixes).
- net: ena: fix incorrectly saving queue numbers when setting RSS indirection table (git-fixes).
- net: ena: fix issues in setting interrupt moderation params in ethtool (git-fixes).
- net: ena: fix potential crash when rxfh key is NULL (git-fixes).
- net: ena: fix retrieval of nonadaptive interrupt moderation intervals (git-fixes).
- net: ena: fix uses of round_jiffies() (git-fixes).
- net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE (git-fixes).
- net: ena: reimplement set/get_coalesce() (git-fixes).
- net: ena: rss: do not allocate key when not supported (git-fixes).
- net: ena: rss: fix failure to get indirection table (git-fixes).
- net: ena: rss: store hash function as values and not bits (git-fixes).
- netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).
- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).
- net: inet_csk: Fix so_reuseport bind-address cache in tb->fast* (networking-stable-20_05_27).
- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).
- net: ipvlan: Fix ipvlan device tso disabled while NETIF_F_IP_CSUM is set (git-fixes).
- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).
- net/mlx4_core: drop useless LIST_HEAD (git-fixes).
- net/mlx4_core: fix a memory leak bug (git-fixes).
- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).
- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).
- net/mlx5: Avoid panic when setting vport rate (git-fixes).
- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).
- net/mlx5e: ethtool, Fix a typo in WOL function names (git-fixes).
- net/mlx5e: Fix traffic duplication in ethtool steering (git-fixes).
- net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).
- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).
- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).
- net/mlx5: Fix crash upon suspend/resume (networking-stable-20_06_07).
- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).
- net: mvmdio: allow up to four clocks to be specified for orion-mdio (git-fixes).
- net: mvpp2: prs: Do not override the sign bit in SRAM parser shift (git-fixes).
- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).
- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).
- net: qede: stop adding events on an already destroyed workqueue (git-fixes).
- net: qed: fix excessive QM ILT lines consumption (git-fixes).
- net: qed: fix NVMe login fails over VFs (git-fixes).
- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).
- net: revert 'net: get rid of an signed integer overflow in ip_idents_reserve()' (networking-stable-20_05_27).
- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).
- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).
- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).
- net: usb: qmi_wwan: add Telit 0x1050 composition (networking-stable-20_06_07).
- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).
- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).
- nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K (git-fixes).
- nilfs2: fix null pointer dereference at nilfs_segctor_do_construct() (bsc#1173857).
- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).
- nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).
- nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).
- objtool: Clean instruction state before each function validation (bsc#1169514).
- objtool: Ignore empty alternatives (bsc#1169514).
- ocfs2: no need try to truncate file beyond i_size (bsc#1171841).
- padata: ensure the reorder timer callback runs on the correct CPU (git-fixes).
- padata: reorder work kABI fixup (git-fixes).
- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).
- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).
- PCI: Generalize multi-function power dependency device links (bsc#1111666).
- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871, bsc#1172872).
- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871, bsc#1172872).
- PCI: hv: Introduce hv_msi_entry (bsc#1172871, bsc#1172872).
- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871, bsc#1172872).
- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871, bsc#1172872).
- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871, bsc#1172872).
- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871, bsc#1172872).
- PCI: pciehp: Fix indefinite wait on sysfs requests (git-fixes).
- PCI: pciehp: Support interrupts sent from D3hot (git-fixes).
- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).
- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).
- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).
- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).
- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).
- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).
- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).
- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).
- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).
- perf/x86/amd/iommu: Make the 'amd_iommu_attr_groups' symbol static (git-fixes).
- perf/x86/amd/iommu: Make the 'amd_iommu_attr_groups' symbol static (git-fixes).
- perf/x86/amd/uncore: Do not set 'ThreadMask' and 'SliceMask' for non-L3 PMCs (git-fixes stable).
- perf/x86/amd/uncore: Do not set 'ThreadMask' and 'SliceMask' for non-L3 PMCs (git-fixes stable).
- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).
- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).
- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).
- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).
- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).
- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).
- perf/x86: Fix incorrect PEBS_REGS (git-fixes).
- perf/x86: Fix incorrect PEBS_REGS (git-fixes).
- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).
- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).
- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).
- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).
- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).
- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).
- perf/x86/intel: Fix PT PMI handling (git-fixes).
- perf/x86/intel: Fix PT PMI handling (git-fixes).
- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).
- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).
- perf/x86/intel/uncore: Add Node ID mask (git-fixes).
- perf/x86/intel/uncore: Add Node ID mask (git-fixes).
- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).
- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).
- perf/x86/intel/uncore: Handle invalid event coding for free-running counter (git-fixes).
- perf/x86/uncore: Fix event group support (git-fixes).
- perf/x86/uncore: Fix event group support (git-fixes).
- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (bsc#1111666).
- PM / Domains: Allow genpd users to specify default active wakeup behavior (git-fixes).
- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).
- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).
- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).
- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).
- power: vexpress: add suppress_bind_attrs to true (bsc#1111666).
- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).
- qed: reduce maximum stack frame size (git-fixes).
- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).
- r8152: support additional Microsoft Surface Ethernet Adapter variant (networking-stable-20_05_27).
- RDMA/efa: Set maximum pkeys device attribute (bsc#1111666)
- README.BRANCH: Add Takashi Iwai as primary maintainer.
- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (bsc#1111666).
- Revert commit e918e570415c ('tpm_tis: Remove the HID IFX0102') (bsc#1111666).
- Revert 'ipv6: add mtu lock check in __ip6_rt_update_pmtu' (networking-stable-20_05_16).
- Revert 'thermal: mediatek: fix register index error' (bsc#1111666).
- rpm/kernel-docs.spec.in: Require python-packaging for build.
- rtnetlink: Fix memory(net_device) leak when ->newlink fails (git-fixes).
- s390: fix syscall_get_error for compat processes (git-fixes).
- s390/qdio: consistently restore the IRQ handler (git-fixes).
- s390/qdio: lock device while installing IRQ handler (git-fixes).
- s390/qdio: put thinint indicator after early error (git-fixes).
- s390/qdio: tear down thinint indicator after early error (git-fixes).
- s390/qeth: fix error handling for isolation mode cmds (git-fixes).
- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).
- sch_sfq: validate silly quantum values (networking-stable-20_05_12).
- scsi: aacraid: fix a signedness bug (bsc#1174296).
- scsi: hisi_sas: fix calls to dma_set_mask_and_coherent() (bsc#1174296).
- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).
- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).
- scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix inconsistent indenting (bsc#1158983).
- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1158983).
- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1158983).
- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).
- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1158983).
- scsi: megaraid_sas: Fix a compilation warning (bsc#1174296).
- scsi: mpt3sas: Fix double free in attach error handling (bsc#1174296).
- scsi: qedf: Add port_id getter (bsc#1150660).
- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1174296).
- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).
- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).
- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).
- spi: fix initial SPI_SR value in spi-fsl-dspi (bsc#1111666).
- spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).
- spi: spidev: fix a race between spidev_release and spidev_remove (bsc#1111666).
- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (bsc#1111666).
- staging: comedi: verify array index is correct before using it (bsc#1111666).
- SUNRPC: The TCP back channel mustn't disappear while requests are outstanding (bsc#1152624).
- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).
- timers: Add a function to start/reduce a timer (networking-stable-20_05_27).
- tpm_tis: extra chip->ops check on error path in tpm_tis_core_init (bsc#1111666).
- tpm_tis: Remove the HID IFX0102 (bsc#1111666).
- tracing: Fix event trigger to accept redundant spaces (git-fixes).
- tty: hvc_console, fix crashes on parallel open/close (git-fixes).
- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).
- ubifs: remove broken lazytime support (bsc#1173826).
- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).
- usb: c67x00: fix use after free in c67x00_giveback_urb (bsc#1111666).
- usb: chipidea: core: add wakeup support for extcon (bsc#1111666).
- usb: dwc2: Fix shutdown callback in platform (bsc#1111666).
- usb: dwc3: gadget: introduce cancelled_list (git-fixes).
- usb: dwc3: gadget: never call ->complete() from ->ep_queue() (git-fixes).
- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).
- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).
- usb: ehci: reopen solution for Synopsys HC bug (git-fixes).
- usb: gadget: fix potential double-free in m66592_probe (bsc#1111666).
- usb: gadget: udc: atmel: fix uninitialized read in debug printk (bsc#1111666).
- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (bsc#1111666).
- usb: gadget: udc: Potential Oops in error handling code (bsc#1111666).
- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (bsc#1111666).
- usbnet: smsc95xx: Fix use-after-free after removal (bsc#1111666).
- usb: ohci-sm501: Add missed iounmap() in remove (bsc#1111666).
- usb: serial: ch341: add new Product ID for CH340 (bsc#1111666).
- usb: serial: cypress_m8: enable Simply Automated UPB PIM (bsc#1111666).
- usb: serial: iuu_phoenix: fix memory corruption (bsc#1111666).
- usb: serial: option: add GosunCn GM500 series (bsc#1111666).
- usb: serial: option: add Quectel EG95 LTE modem (bsc#1111666).
- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174123).
- vfs: Fix EOVERFLOW testing in put_compat_statfs64 (bnc#1151927 5.3.6).
- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).
- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).
- vmxnet3: add support to get/set rx flow hash (bsc#1172484).
- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).
- vmxnet3: avoid format strint overflow warning (bsc#1172484).
- vmxnet3: prepare for version 4 changes (bsc#1172484).
- vmxnet3: Remove always false conditional statement (bsc#1172484).
- vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1172484).
- vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1172484).
- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).
- vmxnet3: update to version 4 (bsc#1172484).
- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).
- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).
- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (git-fixes).
- wil6210: make sure Rx ring sizes are correlated (git-fixes).
- x86/apic: Install an empty physflat_init_apic_ldr (bsc#1163309).
- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).
- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).
- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).
- x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).
- xhci: Fix incorrect EP_STATE_MASK (git-fixes).
Patchnames
SUSE-2020-2122,SUSE-SLE-HA-12-SP5-2020-2122,SUSE-SLE-Live-Patching-12-SP5-2020-2122,SUSE-SLE-SDK-12-SP5-2020-2122,SUSE-SLE-SERVER-12-SP5-2020-2122,SUSE-SLE-WE-12-SP5-2020-2122
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-14331: A buffer over write in vgacon_scroll was fixed (bnc#1174205).\n- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n- CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).\n- CVE-2020-10781: zram sysfs resource consumption was fixed (bnc#1173074).\n- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n- CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a memory leak, aka CID-28ebeb8db770 (bnc#1173514).\n- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).\n- CVE-2019-16746: net/wireless/nl80211.c did not check the length of variable elements in a beacon head, leading to a buffer overflow (bnc#1152107).\n- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).\n- CVE-2020-14416: A race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\nThe following non-security bugs were fixed:\n\n- ACPI: GED: add support for _Exx / _Lxx handler methods (bsc#1111666).\n- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (bsc#1111666).\n- ACPI: NFIT: Fix unlock on error in scrub_show() (bsc#1171753).\n- ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).\n- ACPI: video: Use native backlight on Acer Aspire 5783z (bsc#1111666).\n- ACPI: video: Use native backlight on Acer TravelMate 5735Z (bsc#1111666).\n- ALSA: hda - let hs_mic be picked ahead of hp_mic (bsc#1111666).\n- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (bsc#1111666).\n- ALSA: lx6464es - add support for LX6464ESe pci express variant (bsc#1111666).\n- ALSA: opl3: fix infoleak in opl3 (bsc#1111666).\n- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (bsc#1111666).\n- ALSA: usb-audio: Fix packet size calculation (bsc#1111666).\n- ALSA: usb-audio: Improve frames size computation (bsc#1111666).\n- amdgpu: a NULL -\u003emm does not mean a thread is a kthread (git-fixes).\n- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (bsc#1111666).\n- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (bsc#1111666).\n- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (bsc#1111666).\n- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (bsc#1111666).\n- ax25: fix setsockopt(SO_BINDTODEVICE) (networking-stable-20_05_27).\n- b43: Fix connection problem with WPA3 (bsc#1111666).\n- b43_legacy: Fix connection problem with WPA3 (bsc#1111666).\n- be2net: fix link failure after ethtool offline test (git-fixes).\n- block, bfq: add requeue-request hook (bsc#1104967 bsc#1171673).\n- block, bfq: postpone rq preparation to insert or merge (bsc#1104967 bsc#1171673). Refresh patches.suse/block-bfq-fix-use-after-free-in-bfq_idle_slice_timer.patch\n- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).\n- Bluetooth: Add SCO fallback for invalid LMP parameters error (bsc#1111666).\n- bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).\n- bnxt_en: Fix ethtool selftest crash under error conditions (git-fixes).\n- bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE cmd fails (git-fixes).\n- bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).\n- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (git-fixes).\n- bnxt_en: Fix VF anti-spoof filter setup (networking-stable-20_05_12).\n- bnxt_en: Fix VLAN acceleration handling in bnxt_fix_features() (networking-stable-20_05_12).\n- bnxt_en: Improve AER slot reset (networking-stable-20_05_12).\n- brcmfmac: Transform compatible string for FW loading (bsc#1169771).\n- btrfs: add assertions for tree == inode-\u003eio_tree to extent IO helpers (bsc#1174438).\n- btrfs: add new helper btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: Always use a cached extent_state in btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: always wait on ordered extents at fsync time (bsc#1171761).\n- btrfs: clean up the left over logged_list usage (bsc#1171761).\n- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: fix extent_state leak in btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).\n- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).\n- btrfs: fix list_add corruption and soft lockups in fsync (bsc#1171761).\n- btrfs: fix missing data checksums after a ranged fsync (msync) (bsc#1171761).\n- btrfs: fix missing file extent item for hole after ranged fsync (bsc#1171761).\n- btrfs: fix missing hole after hole punching and fsync when using NO_HOLES (bsc#1171761).\n- btrfs: fix missing semaphore unlock in btrfs_sync_file (bsc#1171761).\n- btrfs: fix rare chances for data loss when doing a fast fsync (bsc#1171761).\n- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).\n- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).\n- btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).\n- btrfs: Remove extra parentheses from condition in copy_items() (bsc#1171761).\n- btrfs: remove no longer used io_err from btrfs_log_ctx (bsc#1171761).\n- btrfs: remove no longer used logged range variables when logging extents (bsc#1171761).\n- btrfs: remove no longer used \u0027sync\u0027 member from transaction handle (bsc#1171761).\n- btrfs: remove remaing full_sync logic from btrfs_sync_file (bsc#1171761).\n- btrfs: remove the logged extents infrastructure (bsc#1171761).\n- btrfs: remove the wait ordered logic in the log_one_extent path (bsc#1171761).\n- btrfs: Return EAGAIN if we can\u0027t start no snpashot write in check_can_nocow (bsc#1174438).\n- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).\n- btrfs: Use newly introduced btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).\n- bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads (bsc#1111666).\n- carl9170: remove P2P_GO support (bsc#1111666).\n- ceph: convert mdsc-\u003ecap_dirty to a per-session list (bsc#1167104).\n- ceph: request expedited service on session\u0027s last cap flush (bsc#1167104).\n- cgroup, blkcg: Prepare some symbols for module and !CONFIG_CGROUP usages (bsc#1173857).\n- clocksource: dw_apb_timer: Make CPU-affiliation being optional (bsc#1111666).\n- crypto: algboss - do not wait during notifier callback (bsc#1111666).\n- crypto: algif_skcipher - Cap recv SG list at ctx-\u003eused (bsc#1111666).\n- crypto: cavium/nitrox - Fix \u0027nitrox_get_first_device()\u0027 when ndevlist is fully iterated (bsc#1111666).\n- crypto: cavium/nitrox - Fix \u0027nitrox_get_first_device()\u0027 when ndevlist is fully iterated (git-fixes).\n- crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).\n- crypto: talitos - fix IPsec cipher in length (git-fixes).\n- crypto: talitos - reorder code in talitos_edesc_alloc() (git-fixes).\n- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).\n- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).\n- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).\n- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).\n- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).\n- driver-core, libnvdimm: Let device subsystems add local lockdep coverage (bsc#1171753).\n- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617, bsc#1170618).\n- drm: bridge: adv7511: Extend list of audio sample rates (bsc#1111666).\n- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1113956) * context changes\n- drm: encoder_slave: fix refcouting error for modules (bsc#1111666).\n- drm: encoder_slave: fix refcouting error for modules (bsc#1114279)\n- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1112178)\n- drm/mediatek: Check plane visibility in atomic_update (bsc#1113956) * context changes\n- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1111666).\n- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (bsc#1111666).\n- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (bsc#1111666).\n- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1113956)\n- drm/radeon: fix double free (bsc#1113956)\n- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1113956)\n- drm/sun4i: hdmi ddc clk: Fix size of m divider (bsc#1111666).\n- drm/tegra: hub: Do not enable orphaned window group (bsc#1111666).\n- drm/vkms: Hold gem object while still in-use (bsc#1113956) * context changes\n- e1000: Distribute switch variables for initialization (bsc#1111666).\n- e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).\n- e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).\n- e1000e: Relax condition to trigger reset for ME workaround (bsc#1111666).\n- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).\n- ext4: fix a data race at inode-\u003ei_blocks (bsc#1171835).\n- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).\n- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).\n- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).\n- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).\n- Fix boot crash with MD (bsc#1174343) Refresh patches.suse/mdraid-fix-read-write-bytes-accounting.patch\n- fix multiplication overflow in copy_fdtable() (bsc#1173825).\n- Fix Patch-mainline tag in the previous zram fix patch\n- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).\n- gpu: host1x: Detach driver on unregister (bsc#1111666).\n- HID: magicmouse: do not set up autorepeat (git-fixes).\n- hv_netvsc: Fix netvsc_start_xmit\u0027s return type (git-fixes).\n- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (bsc#1111666).\n- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (bsc#1111666).\n- hwmon: (max6697) Make sure the OVERT mask is set correctly (bsc#1111666).\n- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (bsc#1111666).\n- i2c: eg20t: Load module automatically if ID matches (bsc#1111666).\n- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (bsc#1111666).\n- i40e: reduce stack usage in i40e_set_fc (git-fixes).\n- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).\n- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).\n- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).\n- ibmvnic: Flush existing work items before device removal (bsc#1065729).\n- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).\n- iio:health:afe4404 Fix timestamp alignment and prevent data leak (bsc#1111666).\n- iio:humidity:hdc100x Fix alignment and data leak issues (bsc#1111666).\n- iio:magnetometer:ak8974: Fix alignment and data leak issues (bsc#1111666).\n- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (bsc#1111666).\n- iio:pressure:ms5611 Fix buffer element alignment (bsc#1111666).\n- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (bsc#1111666).\n- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (bsc#1111666).\n- input: i8042 - Remove special PowerPC handling (git-fixes).\n- Input: synaptics - add a second working PNP_ID for Lenovo T470s (bsc#1111666).\n- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).\n- intel_th: Fix a NULL dereference when hub driver is not loaded (bsc#1111666).\n- iommu/vt-d: Enable PCI ACS for platform opt in hint (bsc#1174130).\n- ipvlan: call dev_change_flags when ipvlan mode is reset (git-fixes).\n- ixgbevf: Remove limit of 10 entries for unicast filter list (git-fixes).\n- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).\n- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).\n- kabi: hv: prevent struct device_node to become defined (bsc#1172871).\n- kABI: protect struct mlx5_cmd_work_ent (kabi).\n- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).\n- kernfs: fix barrier usage in __kernfs_new_node() (bsc#1111666).\n- KVM: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).\n- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).\n- KVM: x86: Fix APIC page invalidation race (bsc#1174122).\n- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).\n- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).\n- libceph: do not omit recovery_deletes in target_copy() (bsc#1173462).\n- libceph: do not omit recovery_deletes in target_copy() (bsc#1174113).\n- libceph: ignore pool overlay and cache logic on redirects (bsc#1173146).\n- libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA deadlock (bsc#1171753).\n- libnvdimm/bus: Prepare the nd_ioctl() path to be re-entrant (bsc#1171753).\n- libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over __nd_ioctl() (bsc#1171753).\n- libnvdimm: cover up changes in struct nvdimm_bus (bsc#1171753).\n- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).\n- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).\n- libnvdimm/label: Remove the dpa align check (bsc#1171759).\n- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).\n- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).\n- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).\n- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).\n- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).\n- libnvdimm/region: Initialize bad block for volatile namespaces (bnc#1151927 5.3.6).\n- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).\n- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).\n- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).\n- lpfc_debugfs: get rid of pointless access_ok() (bsc#1172687 bsc#1171530).\n- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).\n- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).\n- media: si2157: Better check for running tuner in init (bsc#1111666).\n- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered workqueue (git-fixes).\n- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw workqueue (git-fixes).\n- mlxsw: pci: Return error on PCI reset timeout (git-fixes).\n- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).\n- mlxsw: spectrum: Disallow prio-tagged packets when PVID is removed (git-fixes).\n- mlxsw: spectrum_dpipe: Add missing error path (git-fixes).\n- mlxsw: spectrum: Prevent force of 56G (git-fixes).\n- mlxsw: spectrum_router: Refresh nexthop neighbour when it becomes dead (git-fixes).\n- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (git-fixes).\n- mlxsw: spectrum_switchdev: Add MDB entries in prepare phase (git-fixes).\n- mlxsw: spectrum_switchdev: Do not treat static FDB entries as sticky (git-fixes).\n- mmc: sdhci: do not enable card detect interrupt for gpio cd type (bsc#1111666).\n- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (bsc#1111666).\n- mvpp2: remove misleading comment (git-fixes).\n- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).\n- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).\n- net/cxgb4: Check the return from t4_query_params properly (git-fixes).\n- net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).\n- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).\n- net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it (git-fixes).\n- net: ena: add missing ethtool TX timestamping indication (git-fixes).\n- net: ena: avoid memory access violation by validating req_id properly (git-fixes).\n- net: ena: do not wake up tx queue when down (git-fixes).\n- net: ena: ena-com.c: prevent NULL pointer dereference (git-fixes).\n- net: ena: ethtool: use correct value for crc32 hash (git-fixes).\n- net: ena: fix continuous keep-alive resets (git-fixes).\n- net: ena: fix corruption of dev_idx_to_host_tbl (git-fixes).\n- net: ena: fix default tx interrupt moderation interval (git-fixes).\n- net: ena: fix incorrect default RSS key (git-fixes).\n- net: ena: fix incorrectly saving queue numbers when setting RSS indirection table (git-fixes).\n- net: ena: fix issues in setting interrupt moderation params in ethtool (git-fixes).\n- net: ena: fix potential crash when rxfh key is NULL (git-fixes).\n- net: ena: fix retrieval of nonadaptive interrupt moderation intervals (git-fixes).\n- net: ena: fix uses of round_jiffies() (git-fixes).\n- net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE (git-fixes).\n- net: ena: reimplement set/get_coalesce() (git-fixes).\n- net: ena: rss: do not allocate key when not supported (git-fixes).\n- net: ena: rss: fix failure to get indirection table (git-fixes).\n- net: ena: rss: store hash function as values and not bits (git-fixes).\n- netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).\n- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).\n- net: inet_csk: Fix so_reuseport bind-address cache in tb-\u003efast* (networking-stable-20_05_27).\n- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).\n- net: ipvlan: Fix ipvlan device tso disabled while NETIF_F_IP_CSUM is set (git-fixes).\n- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).\n- net/mlx4_core: drop useless LIST_HEAD (git-fixes).\n- net/mlx4_core: fix a memory leak bug (git-fixes).\n- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).\n- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).\n- net/mlx5: Avoid panic when setting vport rate (git-fixes).\n- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).\n- net/mlx5e: ethtool, Fix a typo in WOL function names (git-fixes).\n- net/mlx5e: Fix traffic duplication in ethtool steering (git-fixes).\n- net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).\n- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).\n- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).\n- net/mlx5: Fix crash upon suspend/resume (networking-stable-20_06_07).\n- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).\n- net: mvmdio: allow up to four clocks to be specified for orion-mdio (git-fixes).\n- net: mvpp2: prs: Do not override the sign bit in SRAM parser shift (git-fixes).\n- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).\n- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).\n- net: qede: stop adding events on an already destroyed workqueue (git-fixes).\n- net: qed: fix excessive QM ILT lines consumption (git-fixes).\n- net: qed: fix NVMe login fails over VFs (git-fixes).\n- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).\n- net: revert \u0027net: get rid of an signed integer overflow in ip_idents_reserve()\u0027 (networking-stable-20_05_27).\n- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).\n- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).\n- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).\n- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).\n- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).\n- net: usb: qmi_wwan: add Telit 0x1050 composition (networking-stable-20_06_07).\n- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).\n- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).\n- nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K (git-fixes).\n- nilfs2: fix null pointer dereference at nilfs_segctor_do_construct() (bsc#1173857).\n- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).\n- nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).\n- nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).\n- objtool: Clean instruction state before each function validation (bsc#1169514).\n- objtool: Ignore empty alternatives (bsc#1169514).\n- ocfs2: no need try to truncate file beyond i_size (bsc#1171841).\n- padata: ensure the reorder timer callback runs on the correct CPU (git-fixes).\n- padata: reorder work kABI fixup (git-fixes).\n- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).\n- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).\n- PCI: Generalize multi-function power dependency device links (bsc#1111666).\n- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871, bsc#1172872).\n- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871, bsc#1172872).\n- PCI: hv: Introduce hv_msi_entry (bsc#1172871, bsc#1172872).\n- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871, bsc#1172872).\n- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871, bsc#1172872).\n- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871, bsc#1172872).\n- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871, bsc#1172872).\n- PCI: pciehp: Fix indefinite wait on sysfs requests (git-fixes).\n- PCI: pciehp: Support interrupts sent from D3hot (git-fixes).\n- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).\n- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).\n- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).\n- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).\n- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).\n- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).\n- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).\n- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).\n- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).\n- perf/x86/amd/iommu: Make the \u0027amd_iommu_attr_groups\u0027 symbol static (git-fixes).\n- perf/x86/amd/iommu: Make the \u0027amd_iommu_attr_groups\u0027 symbol static (git-fixes).\n- perf/x86/amd/uncore: Do not set \u0027ThreadMask\u0027 and \u0027SliceMask\u0027 for non-L3 PMCs (git-fixes stable).\n- perf/x86/amd/uncore: Do not set \u0027ThreadMask\u0027 and \u0027SliceMask\u0027 for non-L3 PMCs (git-fixes stable).\n- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).\n- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).\n- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).\n- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).\n- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).\n- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).\n- perf/x86: Fix incorrect PEBS_REGS (git-fixes).\n- perf/x86: Fix incorrect PEBS_REGS (git-fixes).\n- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).\n- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).\n- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).\n- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).\n- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).\n- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).\n- perf/x86/intel: Fix PT PMI handling (git-fixes).\n- perf/x86/intel: Fix PT PMI handling (git-fixes).\n- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).\n- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).\n- perf/x86/intel/uncore: Add Node ID mask (git-fixes).\n- perf/x86/intel/uncore: Add Node ID mask (git-fixes).\n- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).\n- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).\n- perf/x86/intel/uncore: Handle invalid event coding for free-running counter (git-fixes).\n- perf/x86/uncore: Fix event group support (git-fixes).\n- perf/x86/uncore: Fix event group support (git-fixes).\n- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (bsc#1111666).\n- PM / Domains: Allow genpd users to specify default active wakeup behavior (git-fixes).\n- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).\n- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).\n- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).\n- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).\n- power: vexpress: add suppress_bind_attrs to true (bsc#1111666).\n- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).\n- qed: reduce maximum stack frame size (git-fixes).\n- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).\n- r8152: support additional Microsoft Surface Ethernet Adapter variant (networking-stable-20_05_27).\n- RDMA/efa: Set maximum pkeys device attribute (bsc#1111666)\n- README.BRANCH: Add Takashi Iwai as primary maintainer.\n- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (bsc#1111666).\n- Revert commit e918e570415c (\u0027tpm_tis: Remove the HID IFX0102\u0027) (bsc#1111666).\n- Revert \u0027ipv6: add mtu lock check in __ip6_rt_update_pmtu\u0027 (networking-stable-20_05_16).\n- Revert \u0027thermal: mediatek: fix register index error\u0027 (bsc#1111666).\n- rpm/kernel-docs.spec.in: Require python-packaging for build.\n- rtnetlink: Fix memory(net_device) leak when -\u003enewlink fails (git-fixes).\n- s390: fix syscall_get_error for compat processes (git-fixes).\n- s390/qdio: consistently restore the IRQ handler (git-fixes).\n- s390/qdio: lock device while installing IRQ handler (git-fixes).\n- s390/qdio: put thinint indicator after early error (git-fixes).\n- s390/qdio: tear down thinint indicator after early error (git-fixes).\n- s390/qeth: fix error handling for isolation mode cmds (git-fixes).\n- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).\n- sch_sfq: validate silly quantum values (networking-stable-20_05_12).\n- scsi: aacraid: fix a signedness bug (bsc#1174296).\n- scsi: hisi_sas: fix calls to dma_set_mask_and_coherent() (bsc#1174296).\n- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix inconsistent indenting (bsc#1158983).\n- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1158983).\n- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1158983).\n- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1158983).\n- scsi: megaraid_sas: Fix a compilation warning (bsc#1174296).\n- scsi: mpt3sas: Fix double free in attach error handling (bsc#1174296).\n- scsi: qedf: Add port_id getter (bsc#1150660).\n- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1174296).\n- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).\n- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).\n- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).\n- spi: fix initial SPI_SR value in spi-fsl-dspi (bsc#1111666).\n- spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).\n- spi: spidev: fix a race between spidev_release and spidev_remove (bsc#1111666).\n- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (bsc#1111666).\n- staging: comedi: verify array index is correct before using it (bsc#1111666).\n- SUNRPC: The TCP back channel mustn\u0027t disappear while requests are outstanding (bsc#1152624).\n- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).\n- timers: Add a function to start/reduce a timer (networking-stable-20_05_27).\n- tpm_tis: extra chip-\u003eops check on error path in tpm_tis_core_init (bsc#1111666).\n- tpm_tis: Remove the HID IFX0102 (bsc#1111666).\n- tracing: Fix event trigger to accept redundant spaces (git-fixes).\n- tty: hvc_console, fix crashes on parallel open/close (git-fixes).\n- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).\n- ubifs: remove broken lazytime support (bsc#1173826).\n- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).\n- usb: c67x00: fix use after free in c67x00_giveback_urb (bsc#1111666).\n- usb: chipidea: core: add wakeup support for extcon (bsc#1111666).\n- usb: dwc2: Fix shutdown callback in platform (bsc#1111666).\n- usb: dwc3: gadget: introduce cancelled_list (git-fixes).\n- usb: dwc3: gadget: never call -\u003ecomplete() from -\u003eep_queue() (git-fixes).\n- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).\n- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).\n- usb: ehci: reopen solution for Synopsys HC bug (git-fixes).\n- usb: gadget: fix potential double-free in m66592_probe (bsc#1111666).\n- usb: gadget: udc: atmel: fix uninitialized read in debug printk (bsc#1111666).\n- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (bsc#1111666).\n- usb: gadget: udc: Potential Oops in error handling code (bsc#1111666).\n- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (bsc#1111666).\n- usbnet: smsc95xx: Fix use-after-free after removal (bsc#1111666).\n- usb: ohci-sm501: Add missed iounmap() in remove (bsc#1111666).\n- usb: serial: ch341: add new Product ID for CH340 (bsc#1111666).\n- usb: serial: cypress_m8: enable Simply Automated UPB PIM (bsc#1111666).\n- usb: serial: iuu_phoenix: fix memory corruption (bsc#1111666).\n- usb: serial: option: add GosunCn GM500 series (bsc#1111666).\n- usb: serial: option: add Quectel EG95 LTE modem (bsc#1111666).\n- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174123).\n- vfs: Fix EOVERFLOW testing in put_compat_statfs64 (bnc#1151927 5.3.6).\n- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).\n- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).\n- vmxnet3: add support to get/set rx flow hash (bsc#1172484).\n- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).\n- vmxnet3: avoid format strint overflow warning (bsc#1172484).\n- vmxnet3: prepare for version 4 changes (bsc#1172484).\n- vmxnet3: Remove always false conditional statement (bsc#1172484).\n- vmxnet3: remove redundant initialization of pointer \u0027rq\u0027 (bsc#1172484).\n- vmxnet3: remove unused flag \u0027rxcsum\u0027 from struct vmxnet3_adapter (bsc#1172484).\n- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).\n- vmxnet3: update to version 4 (bsc#1172484).\n- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).\n- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).\n- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (git-fixes).\n- wil6210: make sure Rx ring sizes are correlated (git-fixes).\n- x86/apic: Install an empty physflat_init_apic_ldr (bsc#1163309).\n- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).\n- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).\n- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).\n- x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).\n- xhci: Fix incorrect EP_STATE_MASK (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2122,SUSE-SLE-HA-12-SP5-2020-2122,SUSE-SLE-Live-Patching-12-SP5-2020-2122,SUSE-SLE-SDK-12-SP5-2020-2122,SUSE-SLE-SERVER-12-SP5-2020-2122,SUSE-SLE-WE-12-SP5-2020-2122", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2122-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2122-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202122-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2122-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1104967", "url": "https://bugzilla.suse.com/1104967" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1150660", "url": "https://bugzilla.suse.com/1150660" }, { "category": "self", "summary": "SUSE Bug 1151927", "url": "https://bugzilla.suse.com/1151927" }, { "category": "self", "summary": "SUSE Bug 1152107", "url": "https://bugzilla.suse.com/1152107" }, { "category": "self", "summary": "SUSE Bug 1152624", "url": "https://bugzilla.suse.com/1152624" }, { "category": "self", "summary": "SUSE Bug 1158983", "url": "https://bugzilla.suse.com/1158983" }, { "category": "self", "summary": "SUSE Bug 1159058", "url": "https://bugzilla.suse.com/1159058" }, { "category": "self", "summary": "SUSE Bug 1162002", "url": "https://bugzilla.suse.com/1162002" }, { "category": "self", "summary": "SUSE Bug 1163309", "url": "https://bugzilla.suse.com/1163309" }, { "category": "self", "summary": "SUSE Bug 1167104", "url": "https://bugzilla.suse.com/1167104" }, { "category": "self", "summary": "SUSE Bug 1168959", "url": "https://bugzilla.suse.com/1168959" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169771", "url": "https://bugzilla.suse.com/1169771" }, { "category": "self", "summary": "SUSE Bug 1169795", "url": "https://bugzilla.suse.com/1169795" }, { "category": "self", "summary": "SUSE Bug 1170011", "url": "https://bugzilla.suse.com/1170011" }, { "category": "self", "summary": "SUSE Bug 1170442", "url": "https://bugzilla.suse.com/1170442" }, { "category": "self", "summary": "SUSE Bug 1170617", "url": "https://bugzilla.suse.com/1170617" }, { "category": "self", "summary": "SUSE Bug 1170618", "url": "https://bugzilla.suse.com/1170618" }, { "category": "self", "summary": "SUSE Bug 1171124", "url": "https://bugzilla.suse.com/1171124" }, { "category": "self", "summary": "SUSE Bug 1171424", "url": "https://bugzilla.suse.com/1171424" }, { "category": "self", "summary": "SUSE Bug 1171529", "url": "https://bugzilla.suse.com/1171529" }, { "category": "self", "summary": "SUSE Bug 1171530", "url": "https://bugzilla.suse.com/1171530" }, { "category": "self", "summary": "SUSE Bug 1171558", "url": "https://bugzilla.suse.com/1171558" }, { "category": "self", "summary": "SUSE Bug 1171673", "url": "https://bugzilla.suse.com/1171673" }, { "category": "self", "summary": "SUSE Bug 1171732", "url": "https://bugzilla.suse.com/1171732" }, { "category": "self", "summary": "SUSE Bug 1171739", "url": "https://bugzilla.suse.com/1171739" }, { "category": "self", "summary": "SUSE Bug 1171743", "url": "https://bugzilla.suse.com/1171743" }, { "category": "self", "summary": "SUSE Bug 1171753", "url": "https://bugzilla.suse.com/1171753" }, { "category": "self", "summary": "SUSE Bug 1171759", "url": "https://bugzilla.suse.com/1171759" }, { "category": "self", "summary": "SUSE Bug 1171761", "url": "https://bugzilla.suse.com/1171761" }, { "category": "self", "summary": "SUSE Bug 1171835", "url": "https://bugzilla.suse.com/1171835" }, { "category": "self", "summary": "SUSE Bug 1171841", "url": "https://bugzilla.suse.com/1171841" }, { "category": "self", "summary": "SUSE Bug 1171868", "url": "https://bugzilla.suse.com/1171868" }, { "category": "self", "summary": "SUSE Bug 1171988", "url": "https://bugzilla.suse.com/1171988" }, { "category": "self", "summary": "SUSE Bug 1172247", "url": "https://bugzilla.suse.com/1172247" }, { "category": "self", "summary": "SUSE Bug 1172257", "url": "https://bugzilla.suse.com/1172257" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172484", "url": "https://bugzilla.suse.com/1172484" }, { "category": "self", "summary": "SUSE Bug 1172687", "url": "https://bugzilla.suse.com/1172687" }, { "category": "self", "summary": "SUSE Bug 1172719", "url": "https://bugzilla.suse.com/1172719" }, { "category": "self", "summary": "SUSE Bug 1172871", "url": "https://bugzilla.suse.com/1172871" }, { "category": "self", "summary": "SUSE Bug 1172872", "url": "https://bugzilla.suse.com/1172872" }, { "category": "self", "summary": "SUSE Bug 1172999", "url": "https://bugzilla.suse.com/1172999" }, { "category": "self", "summary": "SUSE Bug 1173060", "url": "https://bugzilla.suse.com/1173060" }, { "category": "self", "summary": "SUSE Bug 1173074", "url": "https://bugzilla.suse.com/1173074" }, { "category": "self", "summary": "SUSE Bug 1173146", "url": "https://bugzilla.suse.com/1173146" }, { "category": "self", "summary": "SUSE Bug 1173265", "url": "https://bugzilla.suse.com/1173265" }, { "category": "self", "summary": "SUSE Bug 1173280", "url": "https://bugzilla.suse.com/1173280" }, { "category": "self", "summary": "SUSE Bug 1173284", "url": "https://bugzilla.suse.com/1173284" }, { "category": "self", "summary": "SUSE Bug 1173428", "url": "https://bugzilla.suse.com/1173428" }, { "category": "self", "summary": "SUSE Bug 1173462", "url": "https://bugzilla.suse.com/1173462" }, { "category": "self", "summary": "SUSE Bug 1173514", "url": "https://bugzilla.suse.com/1173514" }, { "category": "self", "summary": "SUSE Bug 1173567", "url": "https://bugzilla.suse.com/1173567" }, { "category": "self", "summary": "SUSE Bug 1173573", "url": "https://bugzilla.suse.com/1173573" }, { "category": "self", "summary": "SUSE Bug 1173746", "url": "https://bugzilla.suse.com/1173746" }, { "category": "self", "summary": "SUSE Bug 1173818", "url": "https://bugzilla.suse.com/1173818" }, { "category": "self", "summary": "SUSE Bug 1173820", "url": "https://bugzilla.suse.com/1173820" }, { "category": "self", "summary": "SUSE Bug 1173825", "url": "https://bugzilla.suse.com/1173825" }, { "category": "self", "summary": "SUSE Bug 1173826", "url": "https://bugzilla.suse.com/1173826" }, { "category": "self", "summary": "SUSE Bug 1173833", "url": "https://bugzilla.suse.com/1173833" }, { "category": "self", "summary": "SUSE Bug 1173838", "url": "https://bugzilla.suse.com/1173838" }, { "category": "self", "summary": "SUSE Bug 1173839", "url": "https://bugzilla.suse.com/1173839" }, { "category": "self", "summary": "SUSE Bug 1173845", "url": "https://bugzilla.suse.com/1173845" }, { "category": "self", "summary": "SUSE Bug 1173857", "url": "https://bugzilla.suse.com/1173857" }, { "category": "self", "summary": "SUSE Bug 1174113", "url": "https://bugzilla.suse.com/1174113" }, { "category": "self", "summary": "SUSE Bug 1174115", "url": "https://bugzilla.suse.com/1174115" }, { "category": "self", "summary": "SUSE Bug 1174122", "url": "https://bugzilla.suse.com/1174122" }, { "category": "self", "summary": "SUSE Bug 1174123", "url": "https://bugzilla.suse.com/1174123" }, { "category": "self", "summary": "SUSE Bug 1174130", "url": "https://bugzilla.suse.com/1174130" }, { "category": "self", "summary": "SUSE Bug 1174205", "url": "https://bugzilla.suse.com/1174205" }, { "category": "self", "summary": "SUSE Bug 1174296", "url": "https://bugzilla.suse.com/1174296" }, { "category": "self", "summary": "SUSE Bug 1174343", "url": "https://bugzilla.suse.com/1174343" }, { "category": "self", "summary": "SUSE Bug 1174356", "url": "https://bugzilla.suse.com/1174356" }, { "category": "self", "summary": "SUSE Bug 1174409", "url": "https://bugzilla.suse.com/1174409" }, { "category": "self", "summary": "SUSE Bug 1174438", "url": "https://bugzilla.suse.com/1174438" }, { "category": "self", "summary": "SUSE Bug 1174462", "url": "https://bugzilla.suse.com/1174462" }, { "category": "self", "summary": "SUSE Bug 1174543", "url": "https://bugzilla.suse.com/1174543" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20908 page", "url": "https://www.suse.com/security/cve/CVE-2019-20908/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0305 page", "url": "https://www.suse.com/security/cve/CVE-2020-0305/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10769 page", "url": "https://www.suse.com/security/cve/CVE-2020-10769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10773 page", "url": "https://www.suse.com/security/cve/CVE-2020-10773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10781 page", "url": "https://www.suse.com/security/cve/CVE-2020-10781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12771 page", "url": "https://www.suse.com/security/cve/CVE-2020-12771/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12888 page", "url": "https://www.suse.com/security/cve/CVE-2020-12888/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14416 page", "url": "https://www.suse.com/security/cve/CVE-2020-14416/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15393 page", "url": "https://www.suse.com/security/cve/CVE-2020-15393/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-08-04T18:10:14Z", "generator": { "date": "2020-08-04T18:10:14Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2122-1", "initial_release_date": "2020-08-04T18:10:14Z", "revision_history": [ { "date": "2020-08-04T18:10:14Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.29.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.29.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-122.29.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.29.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-122.29.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-122.29.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.29.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-122.29.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-122.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.29.1.aarch64", "product": { "name": "kernel-default-4.12.14-122.29.1.aarch64", "product_id": "kernel-default-4.12.14-122.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.29.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-122.29.1.aarch64", "product_id": "kernel-default-base-4.12.14-122.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.29.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-122.29.1.aarch64", "product_id": "kernel-default-devel-4.12.14-122.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.29.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-122.29.1.aarch64", "product_id": "kernel-default-extra-4.12.14-122.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.29.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-122.29.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-122.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.29.1.aarch64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.29.1.aarch64", "product_id": "kernel-default-kgraft-devel-4.12.14-122.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.29.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-122.29.1.aarch64", "product_id": "kernel-obs-build-4.12.14-122.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.29.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-122.29.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-122.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.29.1.aarch64", "product": { "name": "kernel-syms-4.12.14-122.29.1.aarch64", "product_id": "kernel-syms-4.12.14-122.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.29.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-122.29.1.aarch64", "product_id": "kernel-vanilla-4.12.14-122.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.29.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-122.29.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-122.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.29.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.29.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-122.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.29.1.aarch64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.29.1.aarch64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.29.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.29.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-122.29.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-122.29.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.29.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.29.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-122.29.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-122.29.1.noarch", "product": { "name": "kernel-devel-4.12.14-122.29.1.noarch", "product_id": "kernel-devel-4.12.14-122.29.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-122.29.1.noarch", "product": { "name": "kernel-docs-4.12.14-122.29.1.noarch", "product_id": "kernel-docs-4.12.14-122.29.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-122.29.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-122.29.1.noarch", "product_id": "kernel-docs-html-4.12.14-122.29.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-122.29.1.noarch", "product": { "name": "kernel-macros-4.12.14-122.29.1.noarch", "product_id": "kernel-macros-4.12.14-122.29.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-122.29.1.noarch", "product": { "name": "kernel-source-4.12.14-122.29.1.noarch", "product_id": "kernel-source-4.12.14-122.29.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-122.29.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-122.29.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-122.29.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-122.29.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.29.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-122.29.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-122.29.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-122.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-122.29.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-122.29.1.ppc64le", "product_id": "kernel-debug-4.12.14-122.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-122.29.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-122.29.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-122.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-122.29.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-122.29.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-122.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-122.29.1.ppc64le", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-122.29.1.ppc64le", "product_id": "kernel-debug-kgraft-devel-4.12.14-122.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.29.1.ppc64le", "product": { "name": "kernel-default-4.12.14-122.29.1.ppc64le", "product_id": "kernel-default-4.12.14-122.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.29.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-122.29.1.ppc64le", "product_id": "kernel-default-base-4.12.14-122.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.29.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-122.29.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-122.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.29.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-122.29.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-122.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-122.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "product_id": "kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.29.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-122.29.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-122.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.29.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-122.29.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-122.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.29.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-122.29.1.ppc64le", "product_id": "kernel-syms-4.12.14-122.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.29.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-122.29.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-122.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.29.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-122.29.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-122.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.29.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-122.29.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-122.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.29.1.ppc64le", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.29.1.ppc64le", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.29.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.29.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-122.29.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-122.29.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-122.29.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.29.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-122.29.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-122.29.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.29.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-122.29.1.s390x", "product_id": "dlm-kmp-default-4.12.14-122.29.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.29.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-122.29.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-122.29.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.29.1.s390x", "product": { "name": "kernel-default-4.12.14-122.29.1.s390x", "product_id": "kernel-default-4.12.14-122.29.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.29.1.s390x", "product": { "name": "kernel-default-base-4.12.14-122.29.1.s390x", "product_id": "kernel-default-base-4.12.14-122.29.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.29.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-122.29.1.s390x", "product_id": "kernel-default-devel-4.12.14-122.29.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.29.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-122.29.1.s390x", "product_id": "kernel-default-extra-4.12.14-122.29.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.29.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-122.29.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-122.29.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "product_id": "kernel-default-kgraft-devel-4.12.14-122.29.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-122.29.1.s390x", "product": { "name": "kernel-default-man-4.12.14-122.29.1.s390x", "product_id": "kernel-default-man-4.12.14-122.29.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.29.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-122.29.1.s390x", "product_id": "kernel-obs-build-4.12.14-122.29.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.29.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-122.29.1.s390x", "product_id": "kernel-obs-qa-4.12.14-122.29.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.29.1.s390x", "product": { "name": "kernel-syms-4.12.14-122.29.1.s390x", "product_id": "kernel-syms-4.12.14-122.29.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.29.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-122.29.1.s390x", "product_id": "kernel-vanilla-4.12.14-122.29.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.29.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-122.29.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-122.29.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.29.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-122.29.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-122.29.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.29.1.s390x", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.29.1.s390x", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.29.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-122.29.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-122.29.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-122.29.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-122.29.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-122.29.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-122.29.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "product_id": "kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.29.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-122.29.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-122.29.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.29.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-122.29.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-122.29.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-122.29.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.29.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-122.29.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-122.29.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.29.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-122.29.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-122.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-122.29.1.x86_64", "product": { "name": "kernel-debug-4.12.14-122.29.1.x86_64", "product_id": "kernel-debug-4.12.14-122.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-122.29.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-122.29.1.x86_64", "product_id": "kernel-debug-base-4.12.14-122.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-122.29.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-122.29.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-122.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-122.29.1.x86_64", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-122.29.1.x86_64", "product_id": "kernel-debug-kgraft-devel-4.12.14-122.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.29.1.x86_64", "product": { "name": "kernel-default-4.12.14-122.29.1.x86_64", "product_id": "kernel-default-4.12.14-122.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.29.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-122.29.1.x86_64", "product_id": "kernel-default-base-4.12.14-122.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.29.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-122.29.1.x86_64", "product_id": "kernel-default-devel-4.12.14-122.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.29.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-122.29.1.x86_64", "product_id": "kernel-default-extra-4.12.14-122.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.29.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-122.29.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-122.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "product_id": "kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-122.29.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-122.29.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-122.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-122.29.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-122.29.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-122.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-122.29.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-122.29.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-122.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.29.1.x86_64", "product": { "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.29.1.x86_64", "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.29.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-122.29.1.x86_64", "product_id": "kernel-obs-build-4.12.14-122.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.29.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-122.29.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-122.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.29.1.x86_64", "product": { "name": "kernel-syms-4.12.14-122.29.1.x86_64", "product_id": "kernel-syms-4.12.14-122.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.29.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-122.29.1.x86_64", "product_id": "kernel-vanilla-4.12.14-122.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.29.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-122.29.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-122.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.29.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.29.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-122.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.29.1.x86_64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.29.1.x86_64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.29.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.29.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-122.29.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-122.29.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-122.29.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.29.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.29.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.29.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.29.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-122.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.29.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-122.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.29.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-122.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.29.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.29.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-122.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.29.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-122.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.29.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.29.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.29.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.29.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.29.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x" }, "product_reference": "kernel-default-kgraft-4.12.14-122.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.29.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.12.14-122.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.29.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-122.29.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch" }, "product_reference": "kernel-docs-4.12.14-122.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.29.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-122.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.29.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-122.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.29.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-122.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.29.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-122.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.29.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64" }, "product_reference": "kernel-default-4.12.14-122.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.29.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-122.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x" }, "product_reference": "kernel-default-4.12.14-122.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.29.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-122.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.29.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-122.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-122.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.29.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-122.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.29.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-122.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-122.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-122.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-122.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.29.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.29.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.29.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.29.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-122.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.29.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-122.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x" }, "product_reference": "kernel-syms-4.12.14-122.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.29.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64" }, "product_reference": "kernel-default-4.12.14-122.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-122.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x" }, "product_reference": "kernel-default-4.12.14-122.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.29.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-122.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-122.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-122.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.29.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-122.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-122.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-122.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-122.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-122.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.29.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.29.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.29.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.29.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-122.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-122.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x" }, "product_reference": "kernel-syms-4.12.14-122.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-122.29.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-122.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T18:10:14Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2019-20908", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20908" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/firmware/efi/efi.c in the Linux kernel before 5.4. Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20908", "url": "https://www.suse.com/security/cve/CVE-2019-20908" }, { "category": "external", "summary": "SUSE Bug 1173567 for CVE-2019-20908", "url": "https://bugzilla.suse.com/1173567" }, { "category": "external", "summary": "SUSE Bug 1174187 for CVE-2019-20908", "url": "https://bugzilla.suse.com/1174187" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T18:10:14Z", "details": "important" } ], "title": "CVE-2019-20908" }, { "cve": "CVE-2020-0305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0305" } ], "notes": [ { "category": "general", "text": "In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0305", "url": "https://www.suse.com/security/cve/CVE-2020-0305" }, { "category": "external", "summary": "SUSE Bug 1174462 for CVE-2020-0305", "url": "https://bugzilla.suse.com/1174462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T18:10:14Z", "details": "moderate" } ], "title": "CVE-2020-0305" }, { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T18:10:14Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-10769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10769" } ], "notes": [ { "category": "general", "text": "A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10769", "url": "https://www.suse.com/security/cve/CVE-2020-10769" }, { "category": "external", "summary": "SUSE Bug 1173265 for CVE-2020-10769", "url": "https://bugzilla.suse.com/1173265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T18:10:14Z", "details": "moderate" } ], "title": "CVE-2020-10769" }, { "cve": "CVE-2020-10773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10773" } ], "notes": [ { "category": "general", "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u0027s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10773", "url": "https://www.suse.com/security/cve/CVE-2020-10773" }, { "category": "external", "summary": "SUSE Bug 1172999 for CVE-2020-10773", "url": "https://bugzilla.suse.com/1172999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T18:10:14Z", "details": "low" } ], "title": "CVE-2020-10773" }, { "cve": "CVE-2020-10781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10781" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10781", "url": "https://www.suse.com/security/cve/CVE-2020-10781" }, { "category": "external", "summary": "SUSE Bug 1173074 for CVE-2020-10781", "url": "https://bugzilla.suse.com/1173074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T18:10:14Z", "details": "moderate" } ], "title": "CVE-2020-10781" }, { "cve": "CVE-2020-12771", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12771" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12771", "url": "https://www.suse.com/security/cve/CVE-2020-12771" }, { "category": "external", "summary": "SUSE Bug 1171732 for CVE-2020-12771", "url": "https://bugzilla.suse.com/1171732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T18:10:14Z", "details": "moderate" } ], "title": "CVE-2020-12771" }, { "cve": "CVE-2020-12888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12888" } ], "notes": [ { "category": "general", "text": "The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12888", "url": "https://www.suse.com/security/cve/CVE-2020-12888" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171868 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1171868" }, { "category": "external", "summary": "SUSE Bug 1176979 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1176979" }, { "category": "external", "summary": "SUSE Bug 1179612 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1179612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T18:10:14Z", "details": "moderate" } ], "title": "CVE-2020-12888" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T18:10:14Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14416", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14416" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14416", "url": "https://www.suse.com/security/cve/CVE-2020-14416" }, { "category": "external", "summary": "SUSE Bug 1162002 for CVE-2020-14416", "url": "https://bugzilla.suse.com/1162002" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T18:10:14Z", "details": "moderate" } ], "title": "CVE-2020-14416" }, { "cve": "CVE-2020-15393", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15393" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15393", "url": "https://www.suse.com/security/cve/CVE-2020-15393" }, { "category": "external", "summary": "SUSE Bug 1173514 for CVE-2020-15393", "url": "https://bugzilla.suse.com/1173514" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T18:10:14Z", "details": "moderate" } ], "title": "CVE-2020-15393" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T18:10:14Z", "details": "important" } ], "title": "CVE-2020-15780" } ] }
suse-su-2020:2605-1
Vulnerability from csaf_suse
Published
2020-09-11 07:00
Modified
2020-09-11 07:00
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 realtime kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).
- CVE-2020-14356: Fixed a null pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213).
- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).
- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).
- CVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).
- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication Bluetooth might have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access (bsc#1171988).
- CVE-2020-0305: Fixed a a possible use-after-free due to a race condition cdev_get(). This could lead to local escalation of privilege with System execution privileges needed (bnc#1174462).
The following non-security bugs were fixed:
- af_key: pfkey_dump needs parameter validation (git-fixes).
- agp/intel: Fix a memory leak on module initialisation failure (git-fixes).
- ACPI: kABI fixes for subsys exports (bsc#1174968).
- ACPI / LPSS: Resume BYT/CHT I2C controllers from resume_noirq (bsc#1174968).
- ACPI / LPSS: Use acpi_lpss_* instead of acpi_subsys_* functions for hibernate (bsc#1174968).
- ACPI: PM: Introduce 'poweroff' callbacks for ACPI PM domain and LPSS (bsc#1174968).
- ACPI: PM: Simplify and fix PM domain hibernation callbacks (bsc#1174968).
- ACPI: video: Use native backlight on Acer Aspire 5783z (bsc#1111666).
- ACPI: video: Use native backlight on Acer TravelMate 5735Z (bsc#1111666).
- ALSA: core: pcm_iec958: fix kernel-doc (bsc#1111666).
- ALSA: echoaduio: Drop superfluous volatile modifier (bsc#1111666).
- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (bsc#1111666).
- ALSA: hda: Add support for Loongson 7A1000 controller (bsc#1111666).
- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (bsc#1111666).
- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (bsc#1111666).
- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (bsc#1111666).
- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).
- ALSA: hda: fix snd_hda_codec_cleanup() documentation (bsc#1111666).
- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (bsc#1111666).
- ALSA: hda - let hs_mic be picked ahead of hp_mic (bsc#1111666).
- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (bsc#1111666).
- ALSA: hda/realtek: Add model alc298-samsung-headphone (git-fixes).
- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (bsc#1111666).
- ALSA: hda/realtek - Add quirk for Lenovo Carbon X1 8th gen (bsc#1111666).
- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (bsc#1111666).
- ALSA: hda/realtek - Add quirk for MSI GL63 (bsc#1111666).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex Book (git-fixes).
- ALSA: hda/realtek - change to suitable link model for ASUS platform (bsc#1111666).
- ALSA: hda/realtek - Check headset type by unplug and resume (bsc#1111666).
- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (bsc#1111666).
- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (bsc#1111666).
- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (bsc#1111666).
- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (bsc#1111666).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (bsc#1111666).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (bsc#1111666).
- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (bsc#1111666).
- ALSA: hda/realtek: Fix add a 'ultra_low_power' function for intel reference board (alc256) (bsc#1111666).
- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (bsc#1111666).
- ALSA: hda/realtek - Fixed HP right speaker no sound (bsc#1111666).
- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (bsc#1111666).
- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (bsc#1111666).
- ALSA: hda/realtek - Fix unused variable warning (bsc#1111666).
- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (bsc#1111666).
- ALSA: hda - reverse the setting value in the micmute_led_set (bsc#1111666).
- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).
- ALSA: opl3: fix infoleak in opl3 (bsc#1111666).
- ALSA: pci: delete repeated words in comments (bsc#1111666).
- ALSA: seq: oss: Serialize ioctls (bsc#1111666).
- ALSA: usb-audio: Add capture support for Saffire 6 (USB 1.1) (git-fixes).
- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (bsc#1111666).
- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (bsc#1111666).
- ALSA: usb-audio: add startech usb audio dock name (bsc#1111666).
- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (bsc#1111666).
- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (bsc#1111666).
- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (bsc#1111666).
- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (bsc#1111666).
- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).
- ALSA: usb-audio: fix spelling mistake 'buss' -> 'bus' (bsc#1111666).
- ALSA: usb-audio: ignore broken processing/extension unit (git-fixes).
- ALSA: usb-audio: Update documentation comment for MS2109 quirk (git-fixes).
- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (bsc#1111666).
- ALSA: usb/line6: remove 'defined but not used' warning (bsc#1111666).
- arm64: Add MIDR encoding for HiSilicon Taishan CPUs (bsc#1174547).
- arm64: Add MIDR encoding for NVIDIA CPUs (bsc#1174547).
- arm64: add sysfs vulnerability show for meltdown (bsc#1174547).
- arm64: Add sysfs vulnerability show for spectre-v1 (bsc#1174547).
- arm64: add sysfs vulnerability show for spectre-v2 (bsc#1174547).
- arm64: add sysfs vulnerability show for speculative store bypass (bsc#1174547).
- arm64: Advertise mitigation of Spectre-v2, or lack thereof (bsc#1174547).
- arm64: Always enable spectre-v2 vulnerability detection (bsc#1174547).
- arm64: Always enable ssb vulnerability detection (bsc#1174547).
- arm64: backtrace: Do not bother trying to unwind the userspace stack (bsc#1175397).
- arm64: capabilities: Add NVIDIA Denver CPU to bp_harden list (bsc#1174547).
- arm64: capabilities: Merge duplicate Cavium erratum entries (bsc#1174547).
- arm64: capabilities: Merge entries for ARM64_WORKAROUND_CLEAN_CACHE (bsc#1174547).
- arm64: cpufeature: Enable Qualcomm Falkor/Kryo errata 1003 (bsc#1175398).
- arm64: Do not mask out PTE_RDONLY in pte_same() (bsc#1175393).
- arm64: enable generic CPU vulnerabilites support (bsc#1174547).
- arm64: Ensure VM_WRITE|VM_SHARED ptes are clean by default (bsc#1175394).
- arm64: errata: Do not define type field twice for arm64_errata entries (bsc#1174547).
- arm64: errata: Update stale comment (bsc#1174547).
- arm64: Get rid of __smccc_workaround_1_hvc_* (bsc#1174547).
- arm64: kpti: Avoid rewriting early page tables when KASLR is enabled (bsc#1174547).
- arm64: kpti: Update arm64_kernel_use_ng_mappings() when forced on (bsc#1174547).
- arm64: kpti: Whitelist Cortex-A CPUs that do not implement the CSV3 field (bsc#1174547).
- arm64: kpti: Whitelist HiSilicon Taishan v110 CPUs (bsc#1174547).
- arm64: KVM: Avoid setting the upper 32 bits of VTCR_EL2 to 1 (bsc#1133021).
- arm64: KVM: Guests can skip __install_bp_hardening_cb()s HYP work (bsc#1174547).
- arm64: KVM: Use SMCCC_ARCH_WORKAROUND_1 for Falkor BP hardening (bsc#1174547).
- arm64: mm: Fix pte_mkclean, pte_mkdirty semantics (bsc#1175526).
- arm64: Provide a command line to disable spectre_v2 mitigation (bsc#1174547).
- arm64: Silence clang warning on mismatched value/register sizes (bsc#1175396).
- arm64/speculation: Support 'mitigations=' cmdline option (bsc#1174547).
- arm64: ssbd: explicitly depend on <linux/prctl.h> (bsc#1175399).
- arm64: ssbs: Do not treat CPUs with SSBS as unaffected by SSB (bsc#1174547).
- arm64: ssbs: Fix context-switch when SSBS is present on all CPUs (bsc#1175669).
- arm64/sve: <uapi/asm/ptrace.h> should not depend on <uapi/linux/prctl.h> (bsc#1175401).
- arm64/sve: Fix wrong free for task->thread.sve_state (bsc#1175400).
- arm64: tlbflush: avoid writing RES0 bits (bsc#1175402).
- arm64: Use firmware to detect CPUs that are not affected by Spectre-v2 (bsc#1174547).
- ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17 (bsc#1133021).
- ARM: KVM: invalidate icache on guest exit for Cortex-A15 (bsc#1133021).
- ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15 (bsc#1133021).
- ASoC: hda/tegra: Set buffer alignment to 128 bytes (bsc#1111666).
- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).
- AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).
- AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).
- AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).
- ax88172a: fix ax88172a_unbind() failures (git-fixes).
- b43: Remove uninitialized_var() usage (git-fixes).
- block: Fix use-after-free in blkdev_get() (bsc#1174843).
- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (bsc#1111666).
- Bluetooth: Fix update of connection state in `hci_encrypt_cfm` (git-fixes).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (bsc#1111666).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (bsc#1111666).
- bonding: fix active-backup failover for current ARP slave (bsc#1174771).
- bonding: fix a potential double-unregister (git-fixes).
- bonding: show saner speed for broadcast mode (git-fixes).
- bpf: Fix map leak in HASH_OF_MAPS map (git-fixes).
- brcmfmac: keep SDIO watchdog running when console_interval is non-zero (bsc#1111666).
- brcmfmac: set state of hanger slot to FREE when flushing PSQ (bsc#1111666).
- brcmfmac: To fix Bss Info flag definition Bug (bsc#1111666).
- btrfs: add assertions for tree == inode->io_tree to extent IO helpers (bsc#1174438).
- btrfs: add new helper btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: Always use a cached extent_state in btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).
- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).
- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).
- btrfs: fix block group leak when removing fails (bsc#1175149).
- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).
- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).
- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).
- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).
- btrfs: fix extent_state leak in btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).
- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).
- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).
- btrfs: fix memory leaks after failure to lookup checksums during inode logging (bsc#1175550).
- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).
- btrfs: fix race between block group removal and block group creation (bsc#1175149).
- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).
- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).
- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).
- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).
- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).
- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).
- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).
- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).
- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).
- btrfs: Open code btrfs_write_and_wait_marked_extents (bsc#1175149).
- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).
- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).
- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).
- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).
- btrfs: Rename and export clear_btree_io_tree (bsc#1175149).
- btrfs: Return EAGAIN if we can't start no snpashot write in check_can_nocow (bsc#1174438).
- btrfs: treat RWF_{,D}SYNC writes as sync for CRCs (bsc#1175493).
- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).
- btrfs: Use newly introduced btrfs_lock_and_flush_ordered_range (bsc#1174438).
- bus: hisi_lpc: Add .remove method to avoid driver unbind crash (bsc#1174658).
- bus: hisi_lpc: Do not fail probe for unrecognised child devices (bsc#1174658).
- bus: hisi_lpc: Unregister logical PIO range to avoid potential use-after-free (bsc#1174658).
- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).
- cfg80211: check vendor command doit pointer before use (git-fixes).
- cifs: document and cleanup dfs mount (bsc#1144333 bsc#1172428).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1144333 bsc#1172428).
- cifs: fix double free error on share and prefix (bsc#1144333 bsc#1172428).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1144333 bsc#1172428).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1144333 bsc#1172428).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1144333 bsc#1172428).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1144333 bsc#1172428).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1144333 bsc#1172428).
- cifs: rename reconn_inval_dfs_target() (bsc#1144333 bsc#1172428).
- clk: at91: clk-generated: check best_rate against ranges (bsc#1111666).
- clk: clk-atlas6: fix return value check in atlas6_clk_init() (bsc#1111666).
- clk: iproc: round clock rate to the closest (bsc#1111666).
- clk: spear: Remove uninitialized_var() usage (git-fixes).
- clk: st: Remove uninitialized_var() usage (git-fixes).
- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1174549
- console: newport_con: fix an issue about leak related system resources (git-fixes).
- crypto: ccp - Fix use of merged scatterlists (git-fixes).
- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).
- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).
- crypto: rockchip - fix scatterlist nents error (git-fixes).
- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).
- crypto: talitos - check AES key size (git-fixes).
- crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK (git-fixes).
- crypto: talitos - fix IPsec cipher in length (git-fixes).
- crypto: talitos - reorder code in talitos_edesc_alloc() (git-fixes).
- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- dev: Defer free of skbs in flush_backlog (git-fixes).
- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).
- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).
- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).
- devres: keep both device name and resource name in pretty name (git-fixes).
- dlm: Fix kobject memleak (bsc#1175768).
- dlm: remove BUG() before panic() (bsc#1174844).
- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).
- Documentation/networking: Add net DIM documentation (bsc#1174852).
- dpaa2-eth: Fix passing zero to 'PTR_ERR' warning (bsc#1175403).
- dpaa2-eth: free already allocated channels on probe defer (bsc#1175404).
- dpaa2-eth: prevent array underflow in update_cls_rule() (bsc#1175405).
- dpaa_eth: add dropped frames to percpu ethtool stats (bsc#1174550).
- dpaa_eth: add newline in dev_err() msg (bsc#1174550).
- dpaa_eth: avoid timestamp read on error paths (bsc#1175406).
- dpaa_eth: change DMA device (bsc#1174550).
- dpaa_eth: cleanup skb_to_contig_fd() (bsc#1174550).
- dpaa_eth: defer probing after qbman (bsc#1174550).
- dpaa_eth: extend delays in ndo_stop (bsc#1174550).
- dpaa_eth: fix DMA mapping leak (bsc#1174550).
- dpaa_eth: Fix one possible memleak in dpaa_eth_probe (bsc#1174550).
- dpaa_eth: FMan erratum A050385 workaround (bsc#1174550).
- dpaa_eth: perform DMA unmapping before read (bsc#1175407).
- dpaa_eth: register a device link for the qman portal used (bsc#1174550).
- dpaa_eth: remove netdev_err() for user errors (bsc#1174550).
- dpaa_eth: remove redundant code (bsc#1174550).
- dpaa_eth: simplify variables used in dpaa_cleanup_tx_fd() (bsc#1174550).
- dpaa_eth: use a page to store the SGT (bsc#1174550).
- dpaa_eth: use fd information in dpaa_cleanup_tx_fd() (bsc#1174550).
- dpaa_eth: use only one buffer pool per interface (bsc#1174550).
- dpaa_eth: use page backed rx buffers (bsc#1174550).
- driver core: Avoid binding drivers to dead devices (git-fixes).
- Drivers: hv: vmbus: Fix virt_to_hvpfn() for X86_PAE (git-fixes).
- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127, bsc#1175128).
- drivers/perf: hisi: Fix typo in events attribute array (bsc#1175408).
- drivers/perf: hisi: Fixup one DDRC PMU register offset (bsc#1175410).
- drivers/perf: hisi: Fix wrong value for all counters enable (bsc#1175409).
- drm: Added orientation quirk for ASUS tablet model T103HAF (bsc#1111666).
- drm/amdgpu: avoid dereferencing a NULL pointer (bsc#1111666).
- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (bsc#1111666).
- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (bsc#1113956)
- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).
- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1113956)
- drm/arm: fix unintentional integer overflow on left shift (git-fixes).
- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1113956)
- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).
- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1113956)
- drm/debugfs: fix plain echo to connector 'force' attribute (bsc#1111666).
- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).
- drm/etnaviv: fix ref count leak via pm_runtime_get_sync (bsc#1111666).
- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (bsc#1112178)
- drm: hold gem reference until object is no longer accessed (bsc#1113956)
- drm/imx: fix use after free (git-fixes).
- drm/imx: imx-ldb: Disable both channels for split mode in enc->disable() (git-fixes).
- drm/imx: tve: fix regulator_disable error path (git-fixes).
- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).
- drm/msm: ratelimit crtc event overflow error (bsc#1111666).
- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).
- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).
- drm/nouveau: fix multiple instances of reference count leaks (bsc#1111666).
- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).
- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).
- drm/radeon: disable AGP by default (bsc#1111666).
- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).
- drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync (bsc#1111666).
- drm/rockchip: fix VOP_WIN_GET macro (bsc#1175411).
- drm/tilcdc: fix leak & null ref in panel_connector_get_modes (bsc#1111666).
- drm/ttm/nouveau: do not call tt destroy callback on alloc failure (bsc#1175232).
- drm/vmwgfx: Fix two list_for_each loop exit tests (bsc#1111666).
- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (bsc#1111666).
- efi/memreserve: deal with memreserve entries in unmapped memory (bsc#1174685).
- ext4: check journal inode extents more carefully (bsc#1173485).
- ext4: do not allow overlapping system zones (bsc#1173485).
- ext4: fix checking of directory entry validity for inline directories (bsc#1175771).
- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1174840).
- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).
- fat: do not allow to mount if the FAT length == 0 (bsc#1174845).
- fbdev: Detect integer underflow at 'struct fbcon_ops'->clear_margins. (bsc#1112178)
- firmware: google: check if size is valid when decoding VPD data (git-fixes).
- firmware: google: increment VPD key_len properly (git-fixes).
- fpga: dfl: fix bug in port reset handshake (git-fixes).
- fsl/fman: add API to get the device behind a fman port (bsc#1174550).
- fsl/fman: detect FMan erratum A050385 (bsc#1174550).
- fsl/fman: do not touch liodn base regs reserved on non-PAMU SoCs (bsc#1174550).
- fsl/fman: remove unused struct member (bsc#1174550).
- fuse: fix memleak in cuse_channel_open (bsc#1174926).
- fuse: fix missing unlock_page in fuse_writepage() (bsc#1174904).
- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175062).
- fuse: fix weird page warning (bsc#1175063).
- fuse: flush dirty data/metadata before non-truncate setattr (bsc#1175064).
- fuse: truncate pending writes on O_TRUNC (bsc#1175065).
- fuse: verify attributes (bsc#1175066).
- fuse: verify nlink (bsc#1175067).
- genetlink: remove genl_bind (networking-stable-20_07_17).
- go7007: add sanity checking for endpoints (git-fixes).
- gpu: host1x: debug: Fix multiple channels emitting messages simultaneously (bsc#1111666).
- HID: hiddev: fix mess in hiddev_open() (git-fixes).
- HID: magicmouse: do not set up autorepeat (git-fixes).
- HISI LPC: Re-Add ACPI child enumeration support (bsc#1174658).
- HISI LPC: Stop using MFD APIs (bsc#1174658).
- hv_netvsc: Fix error handling in netvsc_attach() (git-fixes).
- hv_netvsc: Fix netvsc_start_xmit's return type (git-fixes).
- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (git-fixes).
- i2c: eg20t: Load module automatically if ID matches (bsc#1111666).
- i2c: rcar: slave: only send STOP event when we have been addressed (bsc#1111666).
- i40e: Fix crash during removing i40e driver (git-fixes).
- i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (git-fixes).
- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).
- ibmveth: Fix use of ibmveth in a bridge (bsc#1174387 ltc#187506).
- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).
- include/linux/poison.h: remove obsolete comment (git fixes (poison)).
- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (bsc#1111666).
- input: i8042 - Remove special PowerPC handling (git-fixes).
- Input: sentelic - fix error return when fsp_reg_write fails (bsc#1111666).
- integrity: remove redundant initialization of variable ret (git-fixes).
- io-mapping: indicate mapping failure (git-fixes).
- ip6_gre: fix null-ptr-deref in ip6gre_init_net() (git-fixes).
- ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() (networking-stable-20_06_28).
- ip_tunnel: Emit events for post-register MTU changes (git-fixes).
- ip_tunnel: fix use-after-free in ip_tunnel_lookup() (networking-stable-20_06_28).
- ip_tunnel: restore binding to ifaces with a large mtu (git-fixes).
- ipv4: fill fl4_icmp_{type,code} in ping_v4_sendmsg (networking-stable-20_07_17).
- ipv4: Silence suspicious RCU usage warning (git-fixes).
- ipv6: fix memory leaks on IPV6_ADDRFORM path (git-fixes).
- ipvlan: fix device features (git-fixes).
- ipvs: allow connection reuse for unconfirmed conntrack (git-fixes).
- ipvs: fix refcount usage for conns in ops mode (git-fixes).
- ipvs: fix the connection sync failed in some cases (bsc#1174699).
- irqchip/gic: Atomically update affinity (bsc#1111666).
- iwlegacy: Check the return value of pcie_capability_read_*() (bsc#1111666).
- jbd2: add the missing unlock_buffer() in the error path of jbd2_write_superblock() (bsc#1175772).
- kABI: genetlink: remove genl_bind (kabi).
- kabi: hv: prevent struct device_node to become defined (bsc#1172871).
- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).
- kernel/cpu_pm: Fix uninitted local in cpu_pm (git fixes (kernel/pm)).
- kernfs: do not call fsnotify() with name without a parent (bsc#1175770).
- KVM: arm64: Ensure 'params' is initialised when looking up sys register (bsc#1133021).
- KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART (bsc#1133021).
- KVM: arm/arm64: Fix young bit from mmu notifier (bsc#1133021).
- KVM: arm/arm64: vgic: Do not rely on the wrong pending table (bsc#1133021).
- KVM: arm/arm64: vgic-its: Fix restoration of unmapped collections (bsc#1133021).
- KVM: arm: Fix DFSR setting for non-LPAE aarch32 guests (bsc#1133021).
- KVM: arm: Make inject_abt32() inject an external abort instead (bsc#1133021).
- kvm: Change offset in kvm_write_guest_offset_cached to unsigned (bsc#1133021).
- KVM: Check for a bad hva before dropping into the ghc slow path (bsc#1133021).
- KVM: PPC: Book3S PR: Remove uninitialized_var() usage (bsc#1065729).
- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).
- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).
- l2tp: remove skb_dst_set() from l2tp_xmit_skb() (networking-stable-20_07_17).
- leds: 88pm860x: fix use-after-free on unbind (git-fixes).
- leds: core: Flush scheduled work for system suspend (git-fixes).
- leds: da903x: fix use-after-free on unbind (git-fixes).
- leds: lm3533: fix use-after-free on unbind (git-fixes).
- leds: lm355x: avoid enum conversion warning (git-fixes).
- leds: wm831x-status: fix use-after-free on unbind (git-fixes).
- lib/dim: Fix -Wunused-const-variable warnings (bsc#1174852).
- lib: dimlib: fix help text typos (bsc#1174852).
- lib: logic_pio: Add logic_pio_unregister_range() (bsc#1174658).
- lib: logic_pio: Avoid possible overlap for unregistering regions (bsc#1174658).
- lib: logic_pio: Fix RCU usage (bsc#1174658).
- linux/dim: Add completions count to dim_sample (bsc#1174852).
- linux/dim: Fix overflow in dim calculation (bsc#1174852).
- linux/dim: Move implementation to .c files (bsc#1174852).
- linux/dim: Move logic to dim.h (bsc#1174852).
- linux/dim: Remove 'net' prefix from internal DIM members (bsc#1174852).
- linux/dim: Rename externally exposed macros (bsc#1174852).
- linux/dim: Rename externally used net_dim members (bsc#1174852).
- linux/dim: Rename net_dim_sample() to net_dim_update_sample() (bsc#1174852).
- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).
- llc: make sure applications use ARPHRD_ETHER (networking-stable-20_07_17).
- mac80211: mesh: Free ie data when leaving mesh (git-fixes).
- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).
- MAINTAINERS: add entry for Dynamic Interrupt Moderation (bsc#1174852).
- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (git-fixes).
- md/raid5: Fix Force reconstruct-write io stuck in degraded raid5 (git-fixes).
- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).
- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).
- media: firewire: Using uninitialized values in node_probe() (git-fixes).
- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).
- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).
- mfd: dln2: Run event handler loop under spinlock (git-fixes).
- mfd: rk808: Fix RK818 ID template (bsc#1175412).
- mld: fix memory leak in ipv6_mc_destroy_dev() (networking-stable-20_06_28).
- mmc: sdhci: do not enable card detect interrupt for gpio cd type (bsc#1111666).
- mm: filemap: clear idle flag for writes (bsc#1175769).
- mm/migrate.c: add missing flush_dcache_page for non-mapped page migrate (git fixes (mm/migrate)).
- mm/mmu_notifier: use hlist_add_head_rcu() (git fixes (mm/mmu_notifiers)).
- mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() (git fixes (mm/compaction)).
- mm/rmap.c: do not reuse anon_vma if we just want a copy (git fixes (mm/rmap)).
- mm/shmem.c: cast the type of unmap_start to u64 (git fixes (mm/shmem)).
- mm, thp: fix defrag setting if newline is not used (git fixes (mm/thp)).
- mm/vunmap: add cond_resched() in vunmap_pmd_range (bsc#1175654 ltc#184617).
- mtd: spi-nor: Fix an error code in spi_nor_read_raw() (bsc#1175413).
- mtd: spi-nor: fix kernel-doc for spi_nor::info (bsc#1175414).
- mtd: spi-nor: fix kernel-doc for spi_nor::reg_proto (bsc#1175415).
- mtd: spi-nor: fix silent truncation in spi_nor_read_raw() (bsc#1175416).
- mwifiex: Prevent memory corruption handling keys (git-fixes).
- net: Added pointer check for dst->ops->neigh_lookup in dst_neigh_lookup_skb (git-fixes).
- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).
- net: bridge: enfore alignment for ethernet address (networking-stable-20_06_28).
- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).
- net: core: reduce recursion limit value (networking-stable-20_06_28).
- net: Do not clear the sock TX queue in sk_set_socket() (networking-stable-20_06_28).
- net: dsa: b53: check for timeout (git-fixes).
- net: dsa: bcm_sf2: Fix node reference count (git-fixes).
- net: ena: Add first_interrupt field to napi struct (bsc#1174852).
- net: ena: add reserved PCI device ID (bsc#1174852).
- net: ena: add support for reporting of packet drops (bsc#1174852).
- net: ena: add support for the rx offset feature (bsc#1174852).
- net: ena: add support for traffic mirroring (bsc#1174852).
- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).
- net: ena: allow setting the hash function without changing the key (bsc#1174852).
- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).
- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).
- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).
- net: ena: change num_queues to num_io_queues for clarity and consistency (bsc#1174852).
- net: ena: changes to RSS hash key allocation (bsc#1174852).
- net: ena: Change WARN_ON expression in ena_del_napi_in_range() (bsc#1174852).
- net: ena: clean up indentation issue (bsc#1174852).
- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).
- net: ena: cosmetic: code reorderings (bsc#1174852).
- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).
- net: ena: cosmetic: fix line break issues (bsc#1174852).
- net: ena: cosmetic: fix spacing issues (bsc#1174852).
- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).
- net: ena: cosmetic: minor code changes (bsc#1174852).
- net: ena: cosmetic: remove unnecessary code (bsc#1174852).
- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).
- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).
- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).
- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).
- net: ena: drop superfluous prototype (bsc#1174852).
- net: ena: enable support of rss hash key and function changes (bsc#1174852).
- net: ena: enable the interrupt_moderation in driver_supported_features (bsc#1174852).
- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).
- net: ena: ethtool: get_channels: use combined only (bsc#1174852).
- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).
- net: ena: ethtool: support set_channels callback (bsc#1174852).
- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).
- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).
- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).
- net: ena: fix incorrect setting of the number of msix vectors (bsc#1174852).
- net: ena: fix incorrect update of intr_delay_resolution (bsc#1174852).
- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).
- net: ena: fix update of interrupt moderation register (bsc#1174852).
- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).
- net: ena: implement XDP drop support (bsc#1174852).
- net: ena: Implement XDP_TX action (bsc#1174852).
- net: ena: make ethtool -l show correct max number of queues (bsc#1174852).
- net: ena: Make missed_tx stat incremental (bsc#1083548).
- net: ena: Make some functions static (bsc#1174852).
- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).
- net: ena: multiple queue creation related cleanups (bsc#1174852).
- net: ena: Prevent reset after device destruction (bsc#1083548).
- net: ena: reduce driver load time (bsc#1174852).
- net: ena: remove all old adaptive rx interrupt moderation code from ena_com (bsc#1174852).
- net: ena: remove code duplication in ena_com_update_nonadaptive_moderation_interval _*() (bsc#1174852).
- net: ena: remove code that does nothing (bsc#1174852).
- net: ena: remove ena_restore_ethtool_params() and relevant fields (bsc#1174852).
- net: ena: remove old adaptive interrupt moderation code from ena_netdev (bsc#1174852).
- net: ena: remove redundant print of number of queues (bsc#1174852).
- net: ena: remove set but not used variable 'hash_key' (bsc#1174852).
- net: ena: remove set but not used variable 'rx_ring' (bsc#1174852).
- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).
- net: ena: Select DIMLIB for ENA_ETHERNET (bsc#1174852).
- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).
- net: ena: support new LLQ acceleration mode (bsc#1174852).
- net: ena: switch to dim algorithm for rx adaptive interrupt moderation (bsc#1174852).
- net: ena: use explicit variable size for clarity (bsc#1174852).
- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).
- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1174852).
- net: ena: xdp: XDP_TX: fix memory leak (bsc#1174852).
- net: ethernet: broadcom: have drivers select DIMLIB as needed (bsc#1174852).
- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).
- net: fec: correct the error path for regulator disable in probe (git-fixes).
- netfilter: x_tables: add counters allocation wrapper (git-fixes).
- netfilter: x_tables: cap allocations at 512 mbyte (git-fixes).
- netfilter: x_tables: limit allocation requests for blob rule heads (git-fixes).
- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes).
- net: fix memleak in register_netdevice() (networking-stable-20_06_28).
- net: Fix the arp error in some cases (networking-stable-20_06_28).
- net: gre: recompute gre csum for sctp over gre tunnels (git-fixes).
- net: hns3: add autoneg and change speed support for fibre port (bsc#1174070).
- net: hns3: add support for FEC encoding control (bsc#1174070).
- net: hns3: add support for multiple media type (bsc#1174070).
- net: hns3: fix a not link up issue when fibre port supports autoneg (bsc#1174070).
- net: hns3: fix for FEC configuration (bsc#1174070).
- net: hns3: fix port capbility updating issue (bsc#1174070).
- net: hns3: fix port setting handle for fibre port (bsc#1174070).
- net: hns3: fix selftest fail issue for fibre port with autoneg on (bsc#1174070).
- net: hns3: restore the MAC autoneg state after reset (bsc#1174070).
- net: increment xmit_recursion level in dev_direct_xmit() (networking-stable-20_06_28).
- net: ip6_gre: Request headroom in __gre6_xmit() (git-fixes).
- net: lan78xx: add missing endpoint sanity check (git-fixes).
- net: lan78xx: fix transfer-buffer memory leak (git-fixes).
- net: make symbol 'flush_works' static (git-fixes).
- net/mlx5: Fix crash upon suspend/resume (networking-stable-20_06_07).
- net: netsec: Fix signedness bug in netsec_probe() (bsc#1175417).
- net: netsec: initialize tx ring on ndo_open (bsc#1175418).
- net: phy: Check harder for errors in get_phy_id() (bsc#1111666).
- net: Set fput_needed iff FDPUT_FPUT is set (git-fixes).
- net: socionext: Fix a signedness bug in ave_probe() (bsc#1175419).
- net: socionext: replace napi_alloc_frag with the netdev variant on init (bsc#1175420).
- net: stmmac: dwmac1000: provide multicast filter fallback (git-fixes).
- net: udp: Fix wrong clean up for IS_UDPLITE macro (git-fixes).
- net: update net_dim documentation after rename (bsc#1174852).
- net: usb: ax88179_178a: fix packet alignment padding (networking-stable-20_06_28).
- net: usb: qmi_wwan: add support for Quectel EG95 LTE modem (networking-stable-20_07_17).
- net: usb: qmi_wwan: add Telit 0x1050 composition (networking-stable-20_06_07).
- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).
- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).
- NTB: Fix an error in get link status (git-fixes).
- ntb_netdev: fix sleep time mismatch (git-fixes).
- NTB: ntb_transport: Use scnprintf() for avoiding potential buffer overflow (git-fixes).
- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).
- nvme: fix possible deadlock when I/O is blocked (git-fixes).
- nvme-multipath: do not fall back to __nvme_find_path() for non-optimized paths (bsc#1172108).
- nvme-multipath: fix logic for non-optimized paths (bsc#1172108).
- nvme-multipath: round-robin: eliminate 'fallback' variable (bsc#1172108).
- nvme: multipath: round-robin: fix single non-optimized path case (bsc#1172108).
- ocfs2: add trimfs dlm lock resource (bsc#1175228).
- ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: change slot number type s16 to u16 (bsc#1175786).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: fix remounting needed after setfacl command (bsc#1173954).
- ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).
- ocfs2: fix value of OCFS2_INVALID_SLOT (bsc#1175767).
- ocfs2: load global_inode_alloc (bsc#1172963).
- ocfs2: load global_inode_alloc (bsc#1172963).
- omapfb: dss: Fix max fclk divider for omap36xx (bsc#1113956)
- openvswitch: Prevent kernel-infoleak in ovs_ct_put_key() (git-fixes).
- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).
- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).
- PCI/ASPM: Add missing newline in sysfs 'policy' (git-fixes).
- PCI: dwc: Move interrupt acking into the proper callback (bsc#1175666).
- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).
- PCI: Fix 'try' semantics of bus and slot reset (git-fixes).
- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).
- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871, bsc#1172872).
- PCI: hv: Fix a timing issue which causes kdump to fail occasionally (bsc#1172871, bsc#1172872, git-fixes).
- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871, bsc#1172872).
- PCI: hv: Introduce hv_msi_entry (bsc#1172871, bsc#1172872).
- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871, bsc#1172872).
- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871, bsc#1172872).
- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871, bsc#1172872).
- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871, bsc#1172872).
- PCI: Release IVRS table in AMD ACS quirk (git-fixes).
- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).
- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).
- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).
- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).
- pinctrl: single: fix function name in documentation (git-fixes).
- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).
- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).
- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).
- PM / CPU: replace raw_notifier with atomic_notifier (git fixes (kernel/pm)).
- PM / devfreq: rk3399_dmc: Add missing of_node_put() (bsc#1175668).
- PM / devfreq: rk3399_dmc: Disable devfreq-event device when fails.
- PM / devfreq: rk3399_dmc: Fix kernel oops when rockchip,pmu is absent (bsc#1175668).
- powerpc/64s: Do not init FSCR_DSCR in __init_FSCR() (bsc#1065729).
- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).
- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).
- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).
- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).
- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).
- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).
- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).
- powerpc/perf: Fix missing is_sier_aviable() during build (bsc#1065729).
- powerpc/pseries: Do not initiate shutdown when system is running on UPS (bsc#1175440 ltc#187574).
- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).
- powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU death (bsc#1085030 ltC#165630).
- powerpc/pseries: PCIE PHB reset (bsc#1174689).
- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).
- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).
- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).
- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).
- propagate_one(): mnt_set_mountpoint() needs mount_lock (bsc#1174841).
- pseries: Fix 64 bit logical memory block panic (bsc#1065729).
- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).
- rds: Prevent kernel-infoleak in rds_notify_queue_get() (git-fixes).
- regulator: gpio: Honor regulator-boot-on property (git-fixes).
- rocker: fix incorrect error handling in dma_rings_init (networking-stable-20_06_28).
- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).
- rtnetlink: Fix memory(net_device) leak when ->newlink fails (git-fixes).
- s390, dcssblk: kaddr and pfn can be NULL to ->direct_access() (bsc#1174873).
- sched: consistently handle layer3 header accesses in the presence of VLANs (networking-stable-20_07_17).
- scripts/git_sort/git_sort.py: add bluetooth/bluetooth-next.git repository
- scsi: dh: Add Fujitsu device to devinfo and dh lists (bsc#1174026).
- scsi: smartpqi: add bay identifier (bsc#1172418).
- scsi: smartpqi: add gigabyte controller (bsc#1172418).
- scsi: smartpqi: add id support for SmartRAID 3152-8i (bsc#1172418).
- scsi: smartpqi: add inquiry timeouts (bsc#1172418).
- scsi: smartpqi: add module param for exposure order (bsc#1172418).
- scsi: smartpqi: add module param to hide vsep (bsc#1172418).
- scsi: smartpqi: add new pci ids (bsc#1172418).
- scsi: smartpqi: add pci ids for fiberhome controller (bsc#1172418).
- scsi: smartpqi: add RAID bypass counter (bsc#1172418).
- scsi: smartpqi: add sysfs entries (bsc#1172418).
- scsi: smartpqi: Align driver syntax with oob (bsc#1172418).
- scsi: smartpqi: avoid crashing kernel for controller issues (bsc#1172418).
- scsi: smartpqi: bump version (bsc#1172418).
- scsi: smartpqi: bump version (bsc#1172418).
- scsi: smartpqi: bump version to 1.2.16-010 (bsc#1172418).
- scsi: smartpqi: change TMF timeout from 60 to 30 seconds (bsc#1172418).
- scsi: smartpqi: correct hang when deleting 32 lds (bsc#1172418).
- scsi: smartpqi: correct REGNEWD return status (bsc#1172418).
- scsi: smartpqi: correct syntax issue (bsc#1172418).
- scsi: smartpqi: fix call trace in device discovery (bsc#1172418).
- scsi: smartpqi: fix controller lockup observed during force reboot (bsc#1172418).
- scsi: smartpqi: fix LUN reset when fw bkgnd thread is hung (bsc#1172418).
- scsi: smartpqi: fix problem with unique ID for physical device (bsc#1172418).
- scsi: smartpqi: identify physical devices without issuing INQUIRY (bsc#1172418).
- scsi: smartpqi: properly set both the DMA mask and the coherent DMA mask (bsc#1172418).
- scsi: smartpqi: remove unused manifest constants (bsc#1172418).
- scsi: smartpqi: Reporting unhandled SCSI errors (bsc#1172418).
- scsi: smartpqi: support device deletion via sysfs (bsc#1172418).
- scsi: smartpqi: update copyright (bsc#1172418).
- scsi: smartpqi: update logical volume size after expansion (bsc#1172418).
- scsi: smartpqi: Use scnprintf() for avoiding potential buffer overflow (bsc#1172418).
- scsi: storvsc: Correctly set number of hardware queues for IDE disk (git-fixes).
- sctp: Do not advertise IPv4 addresses if ipv6only is set on the socket (networking-stable-20_06_28).
- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).
- soc: fsl: qbman: allow registering a device link for the portal user (bsc#1174550).
- soc: fsl: qbman_portals: add APIs to retrieve the probing status (bsc#1174550).
- spi: davinci: Remove uninitialized_var() usage (git-fixes).
- spi: fix initial SPI_SR value in spi-fsl-dspi (bsc#1111666).
- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).
- spi: nxp-fspi: Ensure width is respected in spi-mem operations (bsc#1175421).
- spi: spidev: fix a race between spidev_release and spidev_remove (bsc#1111666).
- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1175422).
- spi: spi-mem: export spi_mem_default_supports_op() (bsc#1175421).
- spi: sun4i: update max transfer size reported (git-fixes).
- staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).
- staging: fsl-dpaa2: ethsw: Add missing netdevice check (bsc#1175423).
- staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).
- Staging: rtl8723bs: prevent buffer overflow in update_sta_support_rate() (git-fixes).
- staging/speakup: fix get_word non-space look-ahead (git-fixes).
- tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT (networking-stable-20_06_28).
- tcp: grow window for OOO packets only for SACK flows (networking-stable-20_06_28).
- tcp: make sure listeners do not initialize congestion-control state (networking-stable-20_07_17).
- tcp: md5: add missing memory barriers in tcp_md5_do_add()/tcp_md5_hash_key() (networking-stable-20_07_17).
- tcp: md5: do not send silly options in SYNCOOKIES (networking-stable-20_07_17).
- tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key() barriers (networking-stable-20_07_17).
- tpm_tis: extra chip->ops check on error path in tpm_tis_core_init (bsc#1111666).
- tracepoint: Mark __tracepoint_string's __used (git-fixes).
- tracing: Use trace_sched_process_free() instead of exit() for pid tracing (git-fixes).
- tty: hvc_console, fix crashes on parallel open/close (git-fixes).
- tty: serial: fsl_lpuart: add imx8qxp support (bsc#1175670).
- tty: serial: fsl_lpuart: free IDs allocated by IDA (bsc#1175670).
- USB: iowarrior: fix up report size handling for some devices (git-fixes).
- usbip: tools: fix module name in man page (git-fixes).
- USB: serial: ch341: add new Product ID for CH340 (bsc#1111666).
- USB: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).
- USB: serial: cp210x: re-enable auto-RTS on open (git-fixes).
- USB: serial: cypress_m8: enable Simply Automated UPB PIM (bsc#1111666).
- USB: serial: iuu_phoenix: fix led-activity helpers (git-fixes).
- USB: serial: option: add GosunCn GM500 series (bsc#1111666).
- USB: serial: option: add Quectel EG95 LTE modem (bsc#1111666).
- usb: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).
- usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).
- VFS: Check rename_lock in lookup_fast() (bsc#1174734).
- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).
- video: pxafb: Fix the function used to balance a 'dma_alloc_coherent()' call (git-fixes).
- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).
- vlan: consolidate VLAN parsing code and limit max parsing depth (networking-stable-20_07_17).
- vmxnet3: use correct tcp hdr length when packet is encapsulated (bsc#1175199).
- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).
- vt_compat_ioctl(): clean up, use compat_ptr() properly (git-fixes).
- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).
- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (bsc#1111666).
- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (bsc#1111666).
- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (bsc#1111666).
- wl1251: fix always return 0 error (git-fixes).
- x86/hyper-v: Fix overflow bug in fill_gva_list() (git-fixes).
- xfrm: check id proto in validate_tmpl() (git-fixes).
- xfrm: clean up xfrm protocol checks (git-fixes).
- xfrm_user: uncoditionally validate esn replay attribute struct (git-fixes).
- xfs: fix inode allocation block res calculation precedence (git-fixes).
- xfs: fix reflink quota reservation accounting error (git-fixes).
- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).
Patchnames
SUSE-2020-2605,SUSE-SLE-RT-12-SP5-2020-2605
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP5 realtime kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).\n- CVE-2020-14356: Fixed a null pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213).\n- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).\n- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).\n- CVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).\n- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication Bluetooth might have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access (bsc#1171988).\n- CVE-2020-0305: Fixed a a possible use-after-free due to a race condition cdev_get(). This could lead to local escalation of privilege with System execution privileges needed (bnc#1174462).\n\nThe following non-security bugs were fixed:\n\n- af_key: pfkey_dump needs parameter validation (git-fixes).\n- agp/intel: Fix a memory leak on module initialisation failure (git-fixes).\n- ACPI: kABI fixes for subsys exports (bsc#1174968).\n- ACPI / LPSS: Resume BYT/CHT I2C controllers from resume_noirq (bsc#1174968).\n- ACPI / LPSS: Use acpi_lpss_* instead of acpi_subsys_* functions for hibernate (bsc#1174968).\n- ACPI: PM: Introduce \u0027poweroff\u0027 callbacks for ACPI PM domain and LPSS (bsc#1174968).\n- ACPI: PM: Simplify and fix PM domain hibernation callbacks (bsc#1174968).\n- ACPI: video: Use native backlight on Acer Aspire 5783z (bsc#1111666).\n- ACPI: video: Use native backlight on Acer TravelMate 5735Z (bsc#1111666).\n- ALSA: core: pcm_iec958: fix kernel-doc (bsc#1111666).\n- ALSA: echoaduio: Drop superfluous volatile modifier (bsc#1111666).\n- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (bsc#1111666).\n- ALSA: hda: Add support for Loongson 7A1000 controller (bsc#1111666).\n- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (bsc#1111666).\n- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (bsc#1111666).\n- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (bsc#1111666).\n- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).\n- ALSA: hda: fix snd_hda_codec_cleanup() documentation (bsc#1111666).\n- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (bsc#1111666).\n- ALSA: hda - let hs_mic be picked ahead of hp_mic (bsc#1111666).\n- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (bsc#1111666).\n- ALSA: hda/realtek: Add model alc298-samsung-headphone (git-fixes).\n- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for Lenovo Carbon X1 8th gen (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for MSI GL63 (bsc#1111666).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex Book (git-fixes).\n- ALSA: hda/realtek - change to suitable link model for ASUS platform (bsc#1111666).\n- ALSA: hda/realtek - Check headset type by unplug and resume (bsc#1111666).\n- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (bsc#1111666).\n- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (bsc#1111666).\n- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (bsc#1111666).\n- ALSA: hda/realtek: Fix add a \u0027ultra_low_power\u0027 function for intel reference board (alc256) (bsc#1111666).\n- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (bsc#1111666).\n- ALSA: hda/realtek - Fixed HP right speaker no sound (bsc#1111666).\n- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (bsc#1111666).\n- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (bsc#1111666).\n- ALSA: hda/realtek - Fix unused variable warning (bsc#1111666).\n- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (bsc#1111666).\n- ALSA: hda - reverse the setting value in the micmute_led_set (bsc#1111666).\n- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).\n- ALSA: opl3: fix infoleak in opl3 (bsc#1111666).\n- ALSA: pci: delete repeated words in comments (bsc#1111666).\n- ALSA: seq: oss: Serialize ioctls (bsc#1111666).\n- ALSA: usb-audio: Add capture support for Saffire 6 (USB 1.1) (git-fixes).\n- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (bsc#1111666).\n- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (bsc#1111666).\n- ALSA: usb-audio: add startech usb audio dock name (bsc#1111666).\n- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (bsc#1111666).\n- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (bsc#1111666).\n- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (bsc#1111666).\n- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (bsc#1111666).\n- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).\n- ALSA: usb-audio: fix spelling mistake \u0027buss\u0027 -\u003e \u0027bus\u0027 (bsc#1111666).\n- ALSA: usb-audio: ignore broken processing/extension unit (git-fixes).\n- ALSA: usb-audio: Update documentation comment for MS2109 quirk (git-fixes).\n- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (bsc#1111666).\n- ALSA: usb/line6: remove \u0027defined but not used\u0027 warning (bsc#1111666).\n- arm64: Add MIDR encoding for HiSilicon Taishan CPUs (bsc#1174547).\n- arm64: Add MIDR encoding for NVIDIA CPUs (bsc#1174547).\n- arm64: add sysfs vulnerability show for meltdown (bsc#1174547).\n- arm64: Add sysfs vulnerability show for spectre-v1 (bsc#1174547).\n- arm64: add sysfs vulnerability show for spectre-v2 (bsc#1174547).\n- arm64: add sysfs vulnerability show for speculative store bypass (bsc#1174547).\n- arm64: Advertise mitigation of Spectre-v2, or lack thereof (bsc#1174547).\n- arm64: Always enable spectre-v2 vulnerability detection (bsc#1174547).\n- arm64: Always enable ssb vulnerability detection (bsc#1174547).\n- arm64: backtrace: Do not bother trying to unwind the userspace stack (bsc#1175397).\n- arm64: capabilities: Add NVIDIA Denver CPU to bp_harden list (bsc#1174547).\n- arm64: capabilities: Merge duplicate Cavium erratum entries (bsc#1174547).\n- arm64: capabilities: Merge entries for ARM64_WORKAROUND_CLEAN_CACHE (bsc#1174547).\n- arm64: cpufeature: Enable Qualcomm Falkor/Kryo errata 1003 (bsc#1175398).\n- arm64: Do not mask out PTE_RDONLY in pte_same() (bsc#1175393).\n- arm64: enable generic CPU vulnerabilites support (bsc#1174547).\n- arm64: Ensure VM_WRITE|VM_SHARED ptes are clean by default (bsc#1175394).\n- arm64: errata: Do not define type field twice for arm64_errata entries (bsc#1174547).\n- arm64: errata: Update stale comment (bsc#1174547).\n- arm64: Get rid of __smccc_workaround_1_hvc_* (bsc#1174547).\n- arm64: kpti: Avoid rewriting early page tables when KASLR is enabled (bsc#1174547).\n- arm64: kpti: Update arm64_kernel_use_ng_mappings() when forced on (bsc#1174547).\n- arm64: kpti: Whitelist Cortex-A CPUs that do not implement the CSV3 field (bsc#1174547).\n- arm64: kpti: Whitelist HiSilicon Taishan v110 CPUs (bsc#1174547).\n- arm64: KVM: Avoid setting the upper 32 bits of VTCR_EL2 to 1 (bsc#1133021).\n- arm64: KVM: Guests can skip __install_bp_hardening_cb()s HYP work (bsc#1174547).\n- arm64: KVM: Use SMCCC_ARCH_WORKAROUND_1 for Falkor BP hardening (bsc#1174547).\n- arm64: mm: Fix pte_mkclean, pte_mkdirty semantics (bsc#1175526).\n- arm64: Provide a command line to disable spectre_v2 mitigation (bsc#1174547).\n- arm64: Silence clang warning on mismatched value/register sizes (bsc#1175396).\n- arm64/speculation: Support \u0027mitigations=\u0027 cmdline option (bsc#1174547).\n- arm64: ssbd: explicitly depend on \u0026lt;linux/prctl.h\u003e (bsc#1175399).\n- arm64: ssbs: Do not treat CPUs with SSBS as unaffected by SSB (bsc#1174547).\n- arm64: ssbs: Fix context-switch when SSBS is present on all CPUs (bsc#1175669).\n- arm64/sve: \u0026lt;uapi/asm/ptrace.h\u003e should not depend on \u0026lt;uapi/linux/prctl.h\u003e (bsc#1175401).\n- arm64/sve: Fix wrong free for task-\u003ethread.sve_state (bsc#1175400).\n- arm64: tlbflush: avoid writing RES0 bits (bsc#1175402).\n- arm64: Use firmware to detect CPUs that are not affected by Spectre-v2 (bsc#1174547).\n- ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17 (bsc#1133021).\n- ARM: KVM: invalidate icache on guest exit for Cortex-A15 (bsc#1133021).\n- ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15 (bsc#1133021).\n- ASoC: hda/tegra: Set buffer alignment to 128 bytes (bsc#1111666).\n- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).\n- AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).\n- AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).\n- AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).\n- ax88172a: fix ax88172a_unbind() failures (git-fixes).\n- b43: Remove uninitialized_var() usage (git-fixes).\n- block: Fix use-after-free in blkdev_get() (bsc#1174843).\n- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (bsc#1111666).\n- Bluetooth: Fix update of connection state in `hci_encrypt_cfm` (git-fixes).\n- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (bsc#1111666).\n- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (bsc#1111666).\n- bonding: fix active-backup failover for current ARP slave (bsc#1174771).\n- bonding: fix a potential double-unregister (git-fixes).\n- bonding: show saner speed for broadcast mode (git-fixes).\n- bpf: Fix map leak in HASH_OF_MAPS map (git-fixes).\n- brcmfmac: keep SDIO watchdog running when console_interval is non-zero (bsc#1111666).\n- brcmfmac: set state of hanger slot to FREE when flushing PSQ (bsc#1111666).\n- brcmfmac: To fix Bss Info flag definition Bug (bsc#1111666).\n- btrfs: add assertions for tree == inode-\u003eio_tree to extent IO helpers (bsc#1174438).\n- btrfs: add new helper btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: Always use a cached extent_state in btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).\n- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).\n- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).\n- btrfs: fix block group leak when removing fails (bsc#1175149).\n- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).\n- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).\n- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).\n- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).\n- btrfs: fix extent_state leak in btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).\n- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).\n- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).\n- btrfs: fix memory leaks after failure to lookup checksums during inode logging (bsc#1175550).\n- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).\n- btrfs: fix race between block group removal and block group creation (bsc#1175149).\n- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).\n- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).\n- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).\n- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).\n- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).\n- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).\n- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).\n- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).\n- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).\n- btrfs: Open code btrfs_write_and_wait_marked_extents (bsc#1175149).\n- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).\n- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).\n- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).\n- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).\n- btrfs: Rename and export clear_btree_io_tree (bsc#1175149).\n- btrfs: Return EAGAIN if we can\u0027t start no snpashot write in check_can_nocow (bsc#1174438).\n- btrfs: treat RWF_{,D}SYNC writes as sync for CRCs (bsc#1175493).\n- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).\n- btrfs: Use newly introduced btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- bus: hisi_lpc: Add .remove method to avoid driver unbind crash (bsc#1174658).\n- bus: hisi_lpc: Do not fail probe for unrecognised child devices (bsc#1174658).\n- bus: hisi_lpc: Unregister logical PIO range to avoid potential use-after-free (bsc#1174658).\n- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).\n- cfg80211: check vendor command doit pointer before use (git-fixes).\n- cifs: document and cleanup dfs mount (bsc#1144333 bsc#1172428).\n- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1144333 bsc#1172428).\n- cifs: fix double free error on share and prefix (bsc#1144333 bsc#1172428).\n- cifs: handle empty list of targets in cifs_reconnect() (bsc#1144333 bsc#1172428).\n- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1144333 bsc#1172428).\n- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1144333 bsc#1172428).\n- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1144333 bsc#1172428).\n- cifs: reduce number of referral requests in DFS link lookups (bsc#1144333 bsc#1172428).\n- cifs: rename reconn_inval_dfs_target() (bsc#1144333 bsc#1172428).\n- clk: at91: clk-generated: check best_rate against ranges (bsc#1111666).\n- clk: clk-atlas6: fix return value check in atlas6_clk_init() (bsc#1111666).\n- clk: iproc: round clock rate to the closest (bsc#1111666).\n- clk: spear: Remove uninitialized_var() usage (git-fixes).\n- clk: st: Remove uninitialized_var() usage (git-fixes).\n- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1174549\n- console: newport_con: fix an issue about leak related system resources (git-fixes).\n- crypto: ccp - Fix use of merged scatterlists (git-fixes).\n- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).\n- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).\n- crypto: rockchip - fix scatterlist nents error (git-fixes).\n- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).\n- crypto: talitos - check AES key size (git-fixes).\n- crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK (git-fixes).\n- crypto: talitos - fix IPsec cipher in length (git-fixes).\n- crypto: talitos - reorder code in talitos_edesc_alloc() (git-fixes).\n- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- dev: Defer free of skbs in flush_backlog (git-fixes).\n- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).\n- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).\n- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).\n- devres: keep both device name and resource name in pretty name (git-fixes).\n- dlm: Fix kobject memleak (bsc#1175768).\n- dlm: remove BUG() before panic() (bsc#1174844).\n- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).\n- Documentation/networking: Add net DIM documentation (bsc#1174852).\n- dpaa2-eth: Fix passing zero to \u0027PTR_ERR\u0027 warning (bsc#1175403).\n- dpaa2-eth: free already allocated channels on probe defer (bsc#1175404).\n- dpaa2-eth: prevent array underflow in update_cls_rule() (bsc#1175405).\n- dpaa_eth: add dropped frames to percpu ethtool stats (bsc#1174550).\n- dpaa_eth: add newline in dev_err() msg (bsc#1174550).\n- dpaa_eth: avoid timestamp read on error paths (bsc#1175406).\n- dpaa_eth: change DMA device (bsc#1174550).\n- dpaa_eth: cleanup skb_to_contig_fd() (bsc#1174550).\n- dpaa_eth: defer probing after qbman (bsc#1174550).\n- dpaa_eth: extend delays in ndo_stop (bsc#1174550).\n- dpaa_eth: fix DMA mapping leak (bsc#1174550).\n- dpaa_eth: Fix one possible memleak in dpaa_eth_probe (bsc#1174550).\n- dpaa_eth: FMan erratum A050385 workaround (bsc#1174550).\n- dpaa_eth: perform DMA unmapping before read (bsc#1175407).\n- dpaa_eth: register a device link for the qman portal used (bsc#1174550).\n- dpaa_eth: remove netdev_err() for user errors (bsc#1174550).\n- dpaa_eth: remove redundant code (bsc#1174550).\n- dpaa_eth: simplify variables used in dpaa_cleanup_tx_fd() (bsc#1174550).\n- dpaa_eth: use a page to store the SGT (bsc#1174550).\n- dpaa_eth: use fd information in dpaa_cleanup_tx_fd() (bsc#1174550).\n- dpaa_eth: use only one buffer pool per interface (bsc#1174550).\n- dpaa_eth: use page backed rx buffers (bsc#1174550).\n- driver core: Avoid binding drivers to dead devices (git-fixes).\n- Drivers: hv: vmbus: Fix virt_to_hvpfn() for X86_PAE (git-fixes).\n- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127, bsc#1175128).\n- drivers/perf: hisi: Fix typo in events attribute array (bsc#1175408).\n- drivers/perf: hisi: Fixup one DDRC PMU register offset (bsc#1175410).\n- drivers/perf: hisi: Fix wrong value for all counters enable (bsc#1175409).\n- drm: Added orientation quirk for ASUS tablet model T103HAF (bsc#1111666).\n- drm/amdgpu: avoid dereferencing a NULL pointer (bsc#1111666).\n- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (bsc#1111666).\n- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (bsc#1113956)\n- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).\n- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1113956)\n- drm/arm: fix unintentional integer overflow on left shift (git-fixes).\n- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1113956)\n- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).\n- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1113956)\n- drm/debugfs: fix plain echo to connector \u0027force\u0027 attribute (bsc#1111666).\n- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).\n- drm/etnaviv: fix ref count leak via pm_runtime_get_sync (bsc#1111666).\n- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (bsc#1112178)\n- drm: hold gem reference until object is no longer accessed (bsc#1113956)\n- drm/imx: fix use after free (git-fixes).\n- drm/imx: imx-ldb: Disable both channels for split mode in enc-\u003edisable() (git-fixes).\n- drm/imx: tve: fix regulator_disable error path (git-fixes).\n- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).\n- drm/msm: ratelimit crtc event overflow error (bsc#1111666).\n- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).\n- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).\n- drm/nouveau: fix multiple instances of reference count leaks (bsc#1111666).\n- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).\n- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).\n- drm/radeon: disable AGP by default (bsc#1111666).\n- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).\n- drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync (bsc#1111666).\n- drm/rockchip: fix VOP_WIN_GET macro (bsc#1175411).\n- drm/tilcdc: fix leak \u0026 null ref in panel_connector_get_modes (bsc#1111666).\n- drm/ttm/nouveau: do not call tt destroy callback on alloc failure (bsc#1175232).\n- drm/vmwgfx: Fix two list_for_each loop exit tests (bsc#1111666).\n- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (bsc#1111666).\n- efi/memreserve: deal with memreserve entries in unmapped memory (bsc#1174685).\n- ext4: check journal inode extents more carefully (bsc#1173485).\n- ext4: do not allow overlapping system zones (bsc#1173485).\n- ext4: fix checking of directory entry validity for inline directories (bsc#1175771).\n- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1174840).\n- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).\n- fat: do not allow to mount if the FAT length == 0 (bsc#1174845).\n- fbdev: Detect integer underflow at \u0027struct fbcon_ops\u0027-\u003eclear_margins. (bsc#1112178)\n- firmware: google: check if size is valid when decoding VPD data (git-fixes).\n- firmware: google: increment VPD key_len properly (git-fixes).\n- fpga: dfl: fix bug in port reset handshake (git-fixes).\n- fsl/fman: add API to get the device behind a fman port (bsc#1174550).\n- fsl/fman: detect FMan erratum A050385 (bsc#1174550).\n- fsl/fman: do not touch liodn base regs reserved on non-PAMU SoCs (bsc#1174550).\n- fsl/fman: remove unused struct member (bsc#1174550).\n- fuse: fix memleak in cuse_channel_open (bsc#1174926).\n- fuse: fix missing unlock_page in fuse_writepage() (bsc#1174904).\n- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175062).\n- fuse: fix weird page warning (bsc#1175063).\n- fuse: flush dirty data/metadata before non-truncate setattr (bsc#1175064).\n- fuse: truncate pending writes on O_TRUNC (bsc#1175065).\n- fuse: verify attributes (bsc#1175066).\n- fuse: verify nlink (bsc#1175067).\n- genetlink: remove genl_bind (networking-stable-20_07_17).\n- go7007: add sanity checking for endpoints (git-fixes).\n- gpu: host1x: debug: Fix multiple channels emitting messages simultaneously (bsc#1111666).\n- HID: hiddev: fix mess in hiddev_open() (git-fixes).\n- HID: magicmouse: do not set up autorepeat (git-fixes).\n- HISI LPC: Re-Add ACPI child enumeration support (bsc#1174658).\n- HISI LPC: Stop using MFD APIs (bsc#1174658).\n- hv_netvsc: Fix error handling in netvsc_attach() (git-fixes).\n- hv_netvsc: Fix netvsc_start_xmit\u0027s return type (git-fixes).\n- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (git-fixes).\n- i2c: eg20t: Load module automatically if ID matches (bsc#1111666).\n- i2c: rcar: slave: only send STOP event when we have been addressed (bsc#1111666).\n- i40e: Fix crash during removing i40e driver (git-fixes).\n- i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (git-fixes).\n- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).\n- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).\n- ibmveth: Fix use of ibmveth in a bridge (bsc#1174387 ltc#187506).\n- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).\n- include/linux/poison.h: remove obsolete comment (git fixes (poison)).\n- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (bsc#1111666).\n- input: i8042 - Remove special PowerPC handling (git-fixes).\n- Input: sentelic - fix error return when fsp_reg_write fails (bsc#1111666).\n- integrity: remove redundant initialization of variable ret (git-fixes).\n- io-mapping: indicate mapping failure (git-fixes).\n- ip6_gre: fix null-ptr-deref in ip6gre_init_net() (git-fixes).\n- ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() (networking-stable-20_06_28).\n- ip_tunnel: Emit events for post-register MTU changes (git-fixes).\n- ip_tunnel: fix use-after-free in ip_tunnel_lookup() (networking-stable-20_06_28).\n- ip_tunnel: restore binding to ifaces with a large mtu (git-fixes).\n- ipv4: fill fl4_icmp_{type,code} in ping_v4_sendmsg (networking-stable-20_07_17).\n- ipv4: Silence suspicious RCU usage warning (git-fixes).\n- ipv6: fix memory leaks on IPV6_ADDRFORM path (git-fixes).\n- ipvlan: fix device features (git-fixes).\n- ipvs: allow connection reuse for unconfirmed conntrack (git-fixes).\n- ipvs: fix refcount usage for conns in ops mode (git-fixes).\n- ipvs: fix the connection sync failed in some cases (bsc#1174699).\n- irqchip/gic: Atomically update affinity (bsc#1111666).\n- iwlegacy: Check the return value of pcie_capability_read_*() (bsc#1111666).\n- jbd2: add the missing unlock_buffer() in the error path of jbd2_write_superblock() (bsc#1175772).\n- kABI: genetlink: remove genl_bind (kabi).\n- kabi: hv: prevent struct device_node to become defined (bsc#1172871).\n- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).\n- kernel/cpu_pm: Fix uninitted local in cpu_pm (git fixes (kernel/pm)).\n- kernfs: do not call fsnotify() with name without a parent (bsc#1175770).\n- KVM: arm64: Ensure \u0027params\u0027 is initialised when looking up sys register (bsc#1133021).\n- KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART (bsc#1133021).\n- KVM: arm/arm64: Fix young bit from mmu notifier (bsc#1133021).\n- KVM: arm/arm64: vgic: Do not rely on the wrong pending table (bsc#1133021).\n- KVM: arm/arm64: vgic-its: Fix restoration of unmapped collections (bsc#1133021).\n- KVM: arm: Fix DFSR setting for non-LPAE aarch32 guests (bsc#1133021).\n- KVM: arm: Make inject_abt32() inject an external abort instead (bsc#1133021).\n- kvm: Change offset in kvm_write_guest_offset_cached to unsigned (bsc#1133021).\n- KVM: Check for a bad hva before dropping into the ghc slow path (bsc#1133021).\n- KVM: PPC: Book3S PR: Remove uninitialized_var() usage (bsc#1065729).\n- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).\n- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).\n- l2tp: remove skb_dst_set() from l2tp_xmit_skb() (networking-stable-20_07_17).\n- leds: 88pm860x: fix use-after-free on unbind (git-fixes).\n- leds: core: Flush scheduled work for system suspend (git-fixes).\n- leds: da903x: fix use-after-free on unbind (git-fixes).\n- leds: lm3533: fix use-after-free on unbind (git-fixes).\n- leds: lm355x: avoid enum conversion warning (git-fixes).\n- leds: wm831x-status: fix use-after-free on unbind (git-fixes).\n- lib/dim: Fix -Wunused-const-variable warnings (bsc#1174852).\n- lib: dimlib: fix help text typos (bsc#1174852).\n- lib: logic_pio: Add logic_pio_unregister_range() (bsc#1174658).\n- lib: logic_pio: Avoid possible overlap for unregistering regions (bsc#1174658).\n- lib: logic_pio: Fix RCU usage (bsc#1174658).\n- linux/dim: Add completions count to dim_sample (bsc#1174852).\n- linux/dim: Fix overflow in dim calculation (bsc#1174852).\n- linux/dim: Move implementation to .c files (bsc#1174852).\n- linux/dim: Move logic to dim.h (bsc#1174852).\n- linux/dim: Remove \u0027net\u0027 prefix from internal DIM members (bsc#1174852).\n- linux/dim: Rename externally exposed macros (bsc#1174852).\n- linux/dim: Rename externally used net_dim members (bsc#1174852).\n- linux/dim: Rename net_dim_sample() to net_dim_update_sample() (bsc#1174852).\n- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).\n- llc: make sure applications use ARPHRD_ETHER (networking-stable-20_07_17).\n- mac80211: mesh: Free ie data when leaving mesh (git-fixes).\n- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).\n- MAINTAINERS: add entry for Dynamic Interrupt Moderation (bsc#1174852).\n- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (git-fixes).\n- md/raid5: Fix Force reconstruct-write io stuck in degraded raid5 (git-fixes).\n- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).\n- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).\n- media: firewire: Using uninitialized values in node_probe() (git-fixes).\n- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).\n- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).\n- mfd: dln2: Run event handler loop under spinlock (git-fixes).\n- mfd: rk808: Fix RK818 ID template (bsc#1175412).\n- mld: fix memory leak in ipv6_mc_destroy_dev() (networking-stable-20_06_28).\n- mmc: sdhci: do not enable card detect interrupt for gpio cd type (bsc#1111666).\n- mm: filemap: clear idle flag for writes (bsc#1175769).\n- mm/migrate.c: add missing flush_dcache_page for non-mapped page migrate (git fixes (mm/migrate)).\n- mm/mmu_notifier: use hlist_add_head_rcu() (git fixes (mm/mmu_notifiers)).\n- mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() (git fixes (mm/compaction)).\n- mm/rmap.c: do not reuse anon_vma if we just want a copy (git fixes (mm/rmap)).\n- mm/shmem.c: cast the type of unmap_start to u64 (git fixes (mm/shmem)).\n- mm, thp: fix defrag setting if newline is not used (git fixes (mm/thp)).\n- mm/vunmap: add cond_resched() in vunmap_pmd_range (bsc#1175654 ltc#184617).\n- mtd: spi-nor: Fix an error code in spi_nor_read_raw() (bsc#1175413).\n- mtd: spi-nor: fix kernel-doc for spi_nor::info (bsc#1175414).\n- mtd: spi-nor: fix kernel-doc for spi_nor::reg_proto (bsc#1175415).\n- mtd: spi-nor: fix silent truncation in spi_nor_read_raw() (bsc#1175416).\n- mwifiex: Prevent memory corruption handling keys (git-fixes).\n- net: Added pointer check for dst-\u003eops-\u003eneigh_lookup in dst_neigh_lookup_skb (git-fixes).\n- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).\n- net: bridge: enfore alignment for ethernet address (networking-stable-20_06_28).\n- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).\n- net: core: reduce recursion limit value (networking-stable-20_06_28).\n- net: Do not clear the sock TX queue in sk_set_socket() (networking-stable-20_06_28).\n- net: dsa: b53: check for timeout (git-fixes).\n- net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n- net: ena: Add first_interrupt field to napi struct (bsc#1174852).\n- net: ena: add reserved PCI device ID (bsc#1174852).\n- net: ena: add support for reporting of packet drops (bsc#1174852).\n- net: ena: add support for the rx offset feature (bsc#1174852).\n- net: ena: add support for traffic mirroring (bsc#1174852).\n- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).\n- net: ena: allow setting the hash function without changing the key (bsc#1174852).\n- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).\n- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).\n- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).\n- net: ena: change num_queues to num_io_queues for clarity and consistency (bsc#1174852).\n- net: ena: changes to RSS hash key allocation (bsc#1174852).\n- net: ena: Change WARN_ON expression in ena_del_napi_in_range() (bsc#1174852).\n- net: ena: clean up indentation issue (bsc#1174852).\n- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).\n- net: ena: cosmetic: code reorderings (bsc#1174852).\n- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).\n- net: ena: cosmetic: fix line break issues (bsc#1174852).\n- net: ena: cosmetic: fix spacing issues (bsc#1174852).\n- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).\n- net: ena: cosmetic: minor code changes (bsc#1174852).\n- net: ena: cosmetic: remove unnecessary code (bsc#1174852).\n- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).\n- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).\n- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).\n- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).\n- net: ena: drop superfluous prototype (bsc#1174852).\n- net: ena: enable support of rss hash key and function changes (bsc#1174852).\n- net: ena: enable the interrupt_moderation in driver_supported_features (bsc#1174852).\n- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).\n- net: ena: ethtool: get_channels: use combined only (bsc#1174852).\n- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).\n- net: ena: ethtool: support set_channels callback (bsc#1174852).\n- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).\n- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).\n- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).\n- net: ena: fix incorrect setting of the number of msix vectors (bsc#1174852).\n- net: ena: fix incorrect update of intr_delay_resolution (bsc#1174852).\n- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).\n- net: ena: fix update of interrupt moderation register (bsc#1174852).\n- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).\n- net: ena: implement XDP drop support (bsc#1174852).\n- net: ena: Implement XDP_TX action (bsc#1174852).\n- net: ena: make ethtool -l show correct max number of queues (bsc#1174852).\n- net: ena: Make missed_tx stat incremental (bsc#1083548).\n- net: ena: Make some functions static (bsc#1174852).\n- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).\n- net: ena: multiple queue creation related cleanups (bsc#1174852).\n- net: ena: Prevent reset after device destruction (bsc#1083548).\n- net: ena: reduce driver load time (bsc#1174852).\n- net: ena: remove all old adaptive rx interrupt moderation code from ena_com (bsc#1174852).\n- net: ena: remove code duplication in ena_com_update_nonadaptive_moderation_interval _*() (bsc#1174852).\n- net: ena: remove code that does nothing (bsc#1174852).\n- net: ena: remove ena_restore_ethtool_params() and relevant fields (bsc#1174852).\n- net: ena: remove old adaptive interrupt moderation code from ena_netdev (bsc#1174852).\n- net: ena: remove redundant print of number of queues (bsc#1174852).\n- net: ena: remove set but not used variable \u0027hash_key\u0027 (bsc#1174852).\n- net: ena: remove set but not used variable \u0027rx_ring\u0027 (bsc#1174852).\n- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).\n- net: ena: Select DIMLIB for ENA_ETHERNET (bsc#1174852).\n- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).\n- net: ena: support new LLQ acceleration mode (bsc#1174852).\n- net: ena: switch to dim algorithm for rx adaptive interrupt moderation (bsc#1174852).\n- net: ena: use explicit variable size for clarity (bsc#1174852).\n- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).\n- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1174852).\n- net: ena: xdp: XDP_TX: fix memory leak (bsc#1174852).\n- net: ethernet: broadcom: have drivers select DIMLIB as needed (bsc#1174852).\n- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).\n- net: fec: correct the error path for regulator disable in probe (git-fixes).\n- netfilter: x_tables: add counters allocation wrapper (git-fixes).\n- netfilter: x_tables: cap allocations at 512 mbyte (git-fixes).\n- netfilter: x_tables: limit allocation requests for blob rule heads (git-fixes).\n- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes).\n- net: fix memleak in register_netdevice() (networking-stable-20_06_28).\n- net: Fix the arp error in some cases (networking-stable-20_06_28).\n- net: gre: recompute gre csum for sctp over gre tunnels (git-fixes).\n- net: hns3: add autoneg and change speed support for fibre port (bsc#1174070).\n- net: hns3: add support for FEC encoding control (bsc#1174070).\n- net: hns3: add support for multiple media type (bsc#1174070).\n- net: hns3: fix a not link up issue when fibre port supports autoneg (bsc#1174070).\n- net: hns3: fix for FEC configuration (bsc#1174070).\n- net: hns3: fix port capbility updating issue (bsc#1174070).\n- net: hns3: fix port setting handle for fibre port (bsc#1174070).\n- net: hns3: fix selftest fail issue for fibre port with autoneg on (bsc#1174070).\n- net: hns3: restore the MAC autoneg state after reset (bsc#1174070).\n- net: increment xmit_recursion level in dev_direct_xmit() (networking-stable-20_06_28).\n- net: ip6_gre: Request headroom in __gre6_xmit() (git-fixes).\n- net: lan78xx: add missing endpoint sanity check (git-fixes).\n- net: lan78xx: fix transfer-buffer memory leak (git-fixes).\n- net: make symbol \u0027flush_works\u0027 static (git-fixes).\n- net/mlx5: Fix crash upon suspend/resume (networking-stable-20_06_07).\n- net: netsec: Fix signedness bug in netsec_probe() (bsc#1175417).\n- net: netsec: initialize tx ring on ndo_open (bsc#1175418).\n- net: phy: Check harder for errors in get_phy_id() (bsc#1111666).\n- net: Set fput_needed iff FDPUT_FPUT is set (git-fixes).\n- net: socionext: Fix a signedness bug in ave_probe() (bsc#1175419).\n- net: socionext: replace napi_alloc_frag with the netdev variant on init (bsc#1175420).\n- net: stmmac: dwmac1000: provide multicast filter fallback (git-fixes).\n- net: udp: Fix wrong clean up for IS_UDPLITE macro (git-fixes).\n- net: update net_dim documentation after rename (bsc#1174852).\n- net: usb: ax88179_178a: fix packet alignment padding (networking-stable-20_06_28).\n- net: usb: qmi_wwan: add support for Quectel EG95 LTE modem (networking-stable-20_07_17).\n- net: usb: qmi_wwan: add Telit 0x1050 composition (networking-stable-20_06_07).\n- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).\n- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).\n- NTB: Fix an error in get link status (git-fixes).\n- ntb_netdev: fix sleep time mismatch (git-fixes).\n- NTB: ntb_transport: Use scnprintf() for avoiding potential buffer overflow (git-fixes).\n- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme-multipath: do not fall back to __nvme_find_path() for non-optimized paths (bsc#1172108).\n- nvme-multipath: fix logic for non-optimized paths (bsc#1172108).\n- nvme-multipath: round-robin: eliminate \u0027fallback\u0027 variable (bsc#1172108).\n- nvme: multipath: round-robin: fix single non-optimized path case (bsc#1172108).\n- ocfs2: add trimfs dlm lock resource (bsc#1175228).\n- ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).\n- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n- ocfs2: change slot number type s16 to u16 (bsc#1175786).\n- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n- ocfs2: fix remounting needed after setfacl command (bsc#1173954).\n- ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).\n- ocfs2: fix value of OCFS2_INVALID_SLOT (bsc#1175767).\n- ocfs2: load global_inode_alloc (bsc#1172963).\n- ocfs2: load global_inode_alloc (bsc#1172963).\n- omapfb: dss: Fix max fclk divider for omap36xx (bsc#1113956)\n- openvswitch: Prevent kernel-infoleak in ovs_ct_put_key() (git-fixes).\n- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).\n- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).\n- PCI/ASPM: Add missing newline in sysfs \u0027policy\u0027 (git-fixes).\n- PCI: dwc: Move interrupt acking into the proper callback (bsc#1175666).\n- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).\n- PCI: Fix \u0027try\u0027 semantics of bus and slot reset (git-fixes).\n- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).\n- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871, bsc#1172872).\n- PCI: hv: Fix a timing issue which causes kdump to fail occasionally (bsc#1172871, bsc#1172872, git-fixes).\n- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871, bsc#1172872).\n- PCI: hv: Introduce hv_msi_entry (bsc#1172871, bsc#1172872).\n- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871, bsc#1172872).\n- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871, bsc#1172872).\n- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871, bsc#1172872).\n- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871, bsc#1172872).\n- PCI: Release IVRS table in AMD ACS quirk (git-fixes).\n- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).\n- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).\n- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).\n- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).\n- pinctrl: single: fix function name in documentation (git-fixes).\n- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).\n- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).\n- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).\n- PM / CPU: replace raw_notifier with atomic_notifier (git fixes (kernel/pm)).\n- PM / devfreq: rk3399_dmc: Add missing of_node_put() (bsc#1175668).\n- PM / devfreq: rk3399_dmc: Disable devfreq-event device when fails.\n- PM / devfreq: rk3399_dmc: Fix kernel oops when rockchip,pmu is absent (bsc#1175668).\n- powerpc/64s: Do not init FSCR_DSCR in __init_FSCR() (bsc#1065729).\n- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).\n- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).\n- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).\n- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).\n- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).\n- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).\n- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).\n- powerpc/perf: Fix missing is_sier_aviable() during build (bsc#1065729).\n- powerpc/pseries: Do not initiate shutdown when system is running on UPS (bsc#1175440 ltc#187574).\n- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).\n- powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU death (bsc#1085030 ltC#165630).\n- powerpc/pseries: PCIE PHB reset (bsc#1174689).\n- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).\n- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).\n- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).\n- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).\n- propagate_one(): mnt_set_mountpoint() needs mount_lock (bsc#1174841).\n- pseries: Fix 64 bit logical memory block panic (bsc#1065729).\n- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).\n- rds: Prevent kernel-infoleak in rds_notify_queue_get() (git-fixes).\n- regulator: gpio: Honor regulator-boot-on property (git-fixes).\n- rocker: fix incorrect error handling in dma_rings_init (networking-stable-20_06_28).\n- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).\n- rtnetlink: Fix memory(net_device) leak when -\u003enewlink fails (git-fixes).\n- s390, dcssblk: kaddr and pfn can be NULL to -\u003edirect_access() (bsc#1174873).\n- sched: consistently handle layer3 header accesses in the presence of VLANs (networking-stable-20_07_17).\n- scripts/git_sort/git_sort.py: add bluetooth/bluetooth-next.git repository\n- scsi: dh: Add Fujitsu device to devinfo and dh lists (bsc#1174026).\n- scsi: smartpqi: add bay identifier (bsc#1172418).\n- scsi: smartpqi: add gigabyte controller (bsc#1172418).\n- scsi: smartpqi: add id support for SmartRAID 3152-8i (bsc#1172418).\n- scsi: smartpqi: add inquiry timeouts (bsc#1172418).\n- scsi: smartpqi: add module param for exposure order (bsc#1172418).\n- scsi: smartpqi: add module param to hide vsep (bsc#1172418).\n- scsi: smartpqi: add new pci ids (bsc#1172418).\n- scsi: smartpqi: add pci ids for fiberhome controller (bsc#1172418).\n- scsi: smartpqi: add RAID bypass counter (bsc#1172418).\n- scsi: smartpqi: add sysfs entries (bsc#1172418).\n- scsi: smartpqi: Align driver syntax with oob (bsc#1172418).\n- scsi: smartpqi: avoid crashing kernel for controller issues (bsc#1172418).\n- scsi: smartpqi: bump version (bsc#1172418).\n- scsi: smartpqi: bump version (bsc#1172418).\n- scsi: smartpqi: bump version to 1.2.16-010 (bsc#1172418).\n- scsi: smartpqi: change TMF timeout from 60 to 30 seconds (bsc#1172418).\n- scsi: smartpqi: correct hang when deleting 32 lds (bsc#1172418).\n- scsi: smartpqi: correct REGNEWD return status (bsc#1172418).\n- scsi: smartpqi: correct syntax issue (bsc#1172418).\n- scsi: smartpqi: fix call trace in device discovery (bsc#1172418).\n- scsi: smartpqi: fix controller lockup observed during force reboot (bsc#1172418).\n- scsi: smartpqi: fix LUN reset when fw bkgnd thread is hung (bsc#1172418).\n- scsi: smartpqi: fix problem with unique ID for physical device (bsc#1172418).\n- scsi: smartpqi: identify physical devices without issuing INQUIRY (bsc#1172418).\n- scsi: smartpqi: properly set both the DMA mask and the coherent DMA mask (bsc#1172418).\n- scsi: smartpqi: remove unused manifest constants (bsc#1172418).\n- scsi: smartpqi: Reporting unhandled SCSI errors (bsc#1172418).\n- scsi: smartpqi: support device deletion via sysfs (bsc#1172418).\n- scsi: smartpqi: update copyright (bsc#1172418).\n- scsi: smartpqi: update logical volume size after expansion (bsc#1172418).\n- scsi: smartpqi: Use scnprintf() for avoiding potential buffer overflow (bsc#1172418).\n- scsi: storvsc: Correctly set number of hardware queues for IDE disk (git-fixes).\n- sctp: Do not advertise IPv4 addresses if ipv6only is set on the socket (networking-stable-20_06_28).\n- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).\n- soc: fsl: qbman: allow registering a device link for the portal user (bsc#1174550).\n- soc: fsl: qbman_portals: add APIs to retrieve the probing status (bsc#1174550).\n- spi: davinci: Remove uninitialized_var() usage (git-fixes).\n- spi: fix initial SPI_SR value in spi-fsl-dspi (bsc#1111666).\n- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).\n- spi: nxp-fspi: Ensure width is respected in spi-mem operations (bsc#1175421).\n- spi: spidev: fix a race between spidev_release and spidev_remove (bsc#1111666).\n- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1175422).\n- spi: spi-mem: export spi_mem_default_supports_op() (bsc#1175421).\n- spi: sun4i: update max transfer size reported (git-fixes).\n- staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).\n- staging: fsl-dpaa2: ethsw: Add missing netdevice check (bsc#1175423).\n- staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).\n- Staging: rtl8723bs: prevent buffer overflow in update_sta_support_rate() (git-fixes).\n- staging/speakup: fix get_word non-space look-ahead (git-fixes).\n- tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT (networking-stable-20_06_28).\n- tcp: grow window for OOO packets only for SACK flows (networking-stable-20_06_28).\n- tcp: make sure listeners do not initialize congestion-control state (networking-stable-20_07_17).\n- tcp: md5: add missing memory barriers in tcp_md5_do_add()/tcp_md5_hash_key() (networking-stable-20_07_17).\n- tcp: md5: do not send silly options in SYNCOOKIES (networking-stable-20_07_17).\n- tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key() barriers (networking-stable-20_07_17).\n- tpm_tis: extra chip-\u003eops check on error path in tpm_tis_core_init (bsc#1111666).\n- tracepoint: Mark __tracepoint_string\u0027s __used (git-fixes).\n- tracing: Use trace_sched_process_free() instead of exit() for pid tracing (git-fixes).\n- tty: hvc_console, fix crashes on parallel open/close (git-fixes).\n- tty: serial: fsl_lpuart: add imx8qxp support (bsc#1175670).\n- tty: serial: fsl_lpuart: free IDs allocated by IDA (bsc#1175670).\n- USB: iowarrior: fix up report size handling for some devices (git-fixes).\n- usbip: tools: fix module name in man page (git-fixes).\n- USB: serial: ch341: add new Product ID for CH340 (bsc#1111666).\n- USB: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).\n- USB: serial: cp210x: re-enable auto-RTS on open (git-fixes).\n- USB: serial: cypress_m8: enable Simply Automated UPB PIM (bsc#1111666).\n- USB: serial: iuu_phoenix: fix led-activity helpers (git-fixes).\n- USB: serial: option: add GosunCn GM500 series (bsc#1111666).\n- USB: serial: option: add Quectel EG95 LTE modem (bsc#1111666).\n- usb: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).\n- usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).\n- VFS: Check rename_lock in lookup_fast() (bsc#1174734).\n- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).\n- video: pxafb: Fix the function used to balance a \u0027dma_alloc_coherent()\u0027 call (git-fixes).\n- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).\n- vlan: consolidate VLAN parsing code and limit max parsing depth (networking-stable-20_07_17).\n- vmxnet3: use correct tcp hdr length when packet is encapsulated (bsc#1175199).\n- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).\n- vt_compat_ioctl(): clean up, use compat_ptr() properly (git-fixes).\n- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).\n- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (bsc#1111666).\n- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (bsc#1111666).\n- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (bsc#1111666).\n- wl1251: fix always return 0 error (git-fixes).\n- x86/hyper-v: Fix overflow bug in fill_gva_list() (git-fixes).\n- xfrm: check id proto in validate_tmpl() (git-fixes).\n- xfrm: clean up xfrm protocol checks (git-fixes).\n- xfrm_user: uncoditionally validate esn replay attribute struct (git-fixes).\n- xfs: fix inode allocation block res calculation precedence (git-fixes).\n- xfs: fix reflink quota reservation accounting error (git-fixes).\n- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2605,SUSE-SLE-RT-12-SP5-2020-2605", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2605-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2605-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202605-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2605-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1074701", "url": "https://bugzilla.suse.com/1074701" }, { "category": "self", "summary": "SUSE Bug 1083548", "url": "https://bugzilla.suse.com/1083548" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1085235", "url": "https://bugzilla.suse.com/1085235" }, { "category": "self", "summary": "SUSE Bug 1085308", "url": "https://bugzilla.suse.com/1085308" }, { "category": "self", "summary": "SUSE Bug 1087078", "url": "https://bugzilla.suse.com/1087078" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1094912", "url": "https://bugzilla.suse.com/1094912" }, { "category": "self", "summary": "SUSE Bug 1100394", "url": "https://bugzilla.suse.com/1100394" }, { "category": "self", "summary": "SUSE Bug 1102640", "url": "https://bugzilla.suse.com/1102640" }, { "category": "self", "summary": "SUSE Bug 1105412", "url": "https://bugzilla.suse.com/1105412" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1120163", "url": "https://bugzilla.suse.com/1120163" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1171988", "url": "https://bugzilla.suse.com/1171988" }, { "category": "self", "summary": "SUSE Bug 1172108", "url": "https://bugzilla.suse.com/1172108" }, { "category": "self", "summary": "SUSE Bug 1172247", "url": "https://bugzilla.suse.com/1172247" }, { "category": "self", "summary": "SUSE Bug 1172418", "url": "https://bugzilla.suse.com/1172418" }, { "category": "self", "summary": "SUSE Bug 1172428", "url": "https://bugzilla.suse.com/1172428" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172871", "url": "https://bugzilla.suse.com/1172871" }, { "category": "self", "summary": "SUSE Bug 1172872", "url": "https://bugzilla.suse.com/1172872" }, { "category": "self", "summary": "SUSE Bug 1172963", "url": "https://bugzilla.suse.com/1172963" }, { "category": "self", "summary": "SUSE Bug 1173485", "url": "https://bugzilla.suse.com/1173485" }, { "category": "self", "summary": "SUSE Bug 1173798", "url": "https://bugzilla.suse.com/1173798" }, { "category": "self", "summary": "SUSE Bug 1173954", "url": "https://bugzilla.suse.com/1173954" }, { "category": "self", "summary": "SUSE Bug 1174026", "url": "https://bugzilla.suse.com/1174026" }, { "category": "self", "summary": "SUSE Bug 1174070", "url": "https://bugzilla.suse.com/1174070" }, { "category": "self", "summary": "SUSE Bug 1174161", "url": "https://bugzilla.suse.com/1174161" }, { "category": "self", "summary": "SUSE Bug 1174205", "url": "https://bugzilla.suse.com/1174205" }, { "category": "self", "summary": "SUSE Bug 1174247", "url": "https://bugzilla.suse.com/1174247" }, { "category": "self", "summary": "SUSE Bug 1174343", "url": "https://bugzilla.suse.com/1174343" }, { "category": "self", "summary": "SUSE Bug 1174356", "url": "https://bugzilla.suse.com/1174356" }, { "category": "self", "summary": "SUSE Bug 1174387", "url": "https://bugzilla.suse.com/1174387" }, { "category": "self", "summary": "SUSE Bug 1174409", "url": "https://bugzilla.suse.com/1174409" }, { "category": "self", "summary": "SUSE Bug 1174438", "url": "https://bugzilla.suse.com/1174438" }, { "category": "self", "summary": "SUSE Bug 1174462", "url": "https://bugzilla.suse.com/1174462" }, { "category": "self", "summary": "SUSE Bug 1174484", "url": "https://bugzilla.suse.com/1174484" }, { "category": "self", "summary": "SUSE Bug 1174547", "url": "https://bugzilla.suse.com/1174547" }, { "category": "self", "summary": "SUSE Bug 1174549", "url": "https://bugzilla.suse.com/1174549" }, { "category": "self", "summary": "SUSE Bug 1174550", "url": "https://bugzilla.suse.com/1174550" }, { "category": "self", "summary": "SUSE Bug 1174625", "url": "https://bugzilla.suse.com/1174625" }, { "category": "self", "summary": "SUSE Bug 1174658", "url": "https://bugzilla.suse.com/1174658" }, { "category": "self", "summary": "SUSE Bug 1174685", "url": "https://bugzilla.suse.com/1174685" }, { "category": "self", "summary": "SUSE Bug 1174689", "url": "https://bugzilla.suse.com/1174689" }, { "category": "self", "summary": "SUSE Bug 1174699", "url": "https://bugzilla.suse.com/1174699" }, { "category": "self", "summary": "SUSE Bug 1174734", "url": "https://bugzilla.suse.com/1174734" }, { "category": "self", "summary": "SUSE Bug 1174757", "url": "https://bugzilla.suse.com/1174757" }, { "category": "self", "summary": "SUSE Bug 1174771", "url": "https://bugzilla.suse.com/1174771" }, { "category": "self", "summary": "SUSE Bug 1174840", "url": "https://bugzilla.suse.com/1174840" }, { "category": "self", "summary": "SUSE Bug 1174841", "url": "https://bugzilla.suse.com/1174841" }, { "category": "self", "summary": "SUSE Bug 1174843", "url": "https://bugzilla.suse.com/1174843" }, { "category": "self", "summary": "SUSE Bug 1174844", "url": "https://bugzilla.suse.com/1174844" }, { "category": "self", "summary": "SUSE Bug 1174845", "url": "https://bugzilla.suse.com/1174845" }, { "category": "self", "summary": "SUSE Bug 1174852", "url": "https://bugzilla.suse.com/1174852" }, { "category": "self", "summary": "SUSE Bug 1174873", "url": "https://bugzilla.suse.com/1174873" }, { "category": "self", "summary": "SUSE Bug 1174887", "url": "https://bugzilla.suse.com/1174887" }, { "category": "self", "summary": "SUSE Bug 1174904", "url": "https://bugzilla.suse.com/1174904" }, { "category": "self", "summary": "SUSE Bug 1174926", "url": "https://bugzilla.suse.com/1174926" }, { "category": "self", "summary": "SUSE Bug 1174968", "url": "https://bugzilla.suse.com/1174968" }, { "category": "self", "summary": "SUSE Bug 1175062", "url": "https://bugzilla.suse.com/1175062" }, { "category": "self", "summary": "SUSE Bug 1175063", "url": "https://bugzilla.suse.com/1175063" }, { "category": "self", "summary": "SUSE Bug 1175064", "url": "https://bugzilla.suse.com/1175064" }, { "category": "self", "summary": "SUSE Bug 1175065", "url": "https://bugzilla.suse.com/1175065" }, { "category": "self", "summary": "SUSE Bug 1175066", "url": "https://bugzilla.suse.com/1175066" }, { "category": "self", "summary": "SUSE Bug 1175067", "url": "https://bugzilla.suse.com/1175067" }, { "category": "self", "summary": "SUSE Bug 1175112", "url": "https://bugzilla.suse.com/1175112" }, { "category": "self", "summary": "SUSE Bug 1175127", "url": "https://bugzilla.suse.com/1175127" }, { "category": "self", "summary": "SUSE Bug 1175128", "url": "https://bugzilla.suse.com/1175128" }, { "category": "self", "summary": "SUSE Bug 1175149", "url": "https://bugzilla.suse.com/1175149" }, { "category": "self", "summary": "SUSE Bug 1175199", "url": "https://bugzilla.suse.com/1175199" }, { "category": "self", "summary": "SUSE Bug 1175213", "url": "https://bugzilla.suse.com/1175213" }, { "category": "self", "summary": "SUSE Bug 1175228", "url": "https://bugzilla.suse.com/1175228" }, { "category": "self", "summary": "SUSE Bug 1175232", "url": "https://bugzilla.suse.com/1175232" }, { "category": "self", "summary": "SUSE Bug 1175284", "url": "https://bugzilla.suse.com/1175284" }, { "category": "self", "summary": "SUSE Bug 1175393", "url": "https://bugzilla.suse.com/1175393" }, { "category": "self", "summary": "SUSE Bug 1175394", "url": "https://bugzilla.suse.com/1175394" }, { "category": "self", "summary": "SUSE Bug 1175396", "url": "https://bugzilla.suse.com/1175396" }, { "category": "self", "summary": "SUSE Bug 1175397", "url": "https://bugzilla.suse.com/1175397" }, { "category": "self", "summary": "SUSE Bug 1175398", "url": "https://bugzilla.suse.com/1175398" }, { "category": "self", "summary": "SUSE Bug 1175399", "url": "https://bugzilla.suse.com/1175399" }, { "category": "self", "summary": "SUSE Bug 1175400", "url": "https://bugzilla.suse.com/1175400" }, { "category": "self", "summary": "SUSE Bug 1175401", "url": "https://bugzilla.suse.com/1175401" }, { "category": "self", "summary": "SUSE Bug 1175402", "url": "https://bugzilla.suse.com/1175402" }, { "category": "self", "summary": "SUSE Bug 1175403", "url": "https://bugzilla.suse.com/1175403" }, { "category": "self", "summary": "SUSE Bug 1175404", "url": "https://bugzilla.suse.com/1175404" }, { "category": "self", "summary": "SUSE Bug 1175405", "url": "https://bugzilla.suse.com/1175405" }, { "category": "self", "summary": "SUSE Bug 1175406", "url": "https://bugzilla.suse.com/1175406" }, { "category": "self", "summary": "SUSE Bug 1175407", "url": "https://bugzilla.suse.com/1175407" }, { "category": "self", "summary": "SUSE Bug 1175408", "url": "https://bugzilla.suse.com/1175408" }, { "category": "self", "summary": "SUSE Bug 1175409", "url": "https://bugzilla.suse.com/1175409" }, { "category": "self", "summary": "SUSE Bug 1175410", "url": "https://bugzilla.suse.com/1175410" }, { "category": "self", "summary": "SUSE Bug 1175411", "url": "https://bugzilla.suse.com/1175411" }, { "category": "self", "summary": "SUSE Bug 1175412", "url": "https://bugzilla.suse.com/1175412" }, { "category": "self", "summary": "SUSE Bug 1175413", "url": "https://bugzilla.suse.com/1175413" }, { "category": "self", "summary": "SUSE Bug 1175414", "url": "https://bugzilla.suse.com/1175414" }, { "category": "self", "summary": "SUSE Bug 1175415", "url": "https://bugzilla.suse.com/1175415" }, { "category": "self", "summary": "SUSE Bug 1175416", "url": "https://bugzilla.suse.com/1175416" }, { "category": "self", "summary": "SUSE Bug 1175417", "url": "https://bugzilla.suse.com/1175417" }, { "category": "self", "summary": "SUSE Bug 1175418", "url": "https://bugzilla.suse.com/1175418" }, { "category": "self", "summary": "SUSE Bug 1175419", "url": "https://bugzilla.suse.com/1175419" }, { "category": "self", "summary": "SUSE Bug 1175420", "url": "https://bugzilla.suse.com/1175420" }, { "category": "self", "summary": "SUSE Bug 1175421", "url": "https://bugzilla.suse.com/1175421" }, { "category": "self", "summary": "SUSE Bug 1175422", "url": "https://bugzilla.suse.com/1175422" }, { "category": "self", "summary": "SUSE Bug 1175423", "url": "https://bugzilla.suse.com/1175423" }, { "category": "self", "summary": "SUSE Bug 1175440", "url": "https://bugzilla.suse.com/1175440" }, { "category": "self", "summary": "SUSE Bug 1175493", "url": "https://bugzilla.suse.com/1175493" }, { "category": "self", "summary": "SUSE Bug 1175518", "url": "https://bugzilla.suse.com/1175518" }, { "category": "self", "summary": "SUSE Bug 1175526", "url": "https://bugzilla.suse.com/1175526" }, { "category": "self", "summary": "SUSE Bug 1175550", "url": "https://bugzilla.suse.com/1175550" }, { "category": "self", "summary": "SUSE Bug 1175654", "url": "https://bugzilla.suse.com/1175654" }, { "category": "self", "summary": "SUSE Bug 1175666", "url": "https://bugzilla.suse.com/1175666" }, { "category": "self", "summary": "SUSE Bug 1175668", "url": "https://bugzilla.suse.com/1175668" }, { "category": "self", "summary": "SUSE Bug 1175669", "url": "https://bugzilla.suse.com/1175669" }, { "category": "self", "summary": "SUSE Bug 1175670", "url": "https://bugzilla.suse.com/1175670" }, { "category": "self", "summary": "SUSE Bug 1175767", "url": "https://bugzilla.suse.com/1175767" }, { "category": "self", "summary": "SUSE Bug 1175768", "url": "https://bugzilla.suse.com/1175768" }, { "category": "self", "summary": "SUSE Bug 1175769", "url": "https://bugzilla.suse.com/1175769" }, { "category": "self", "summary": "SUSE Bug 1175770", "url": "https://bugzilla.suse.com/1175770" }, { "category": "self", "summary": "SUSE Bug 1175771", "url": "https://bugzilla.suse.com/1175771" }, { "category": "self", "summary": "SUSE Bug 1175772", "url": "https://bugzilla.suse.com/1175772" }, { "category": "self", "summary": "SUSE Bug 1175786", "url": "https://bugzilla.suse.com/1175786" }, { "category": "self", "summary": "SUSE Bug 1175992", "url": "https://bugzilla.suse.com/1175992" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3639 page", "url": "https://www.suse.com/security/cve/CVE-2018-3639/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0305 page", "url": "https://www.suse.com/security/cve/CVE-2020-0305/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14314 page", "url": "https://www.suse.com/security/cve/CVE-2020-14314/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14356 page", "url": "https://www.suse.com/security/cve/CVE-2020-14356/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16166 page", "url": "https://www.suse.com/security/cve/CVE-2020-16166/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24394 page", "url": "https://www.suse.com/security/cve/CVE-2020-24394/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-09-11T07:00:58Z", "generator": { "date": "2020-09-11T07:00:58Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2605-1", "initial_release_date": "2020-09-11T07:00:58Z", "revision_history": [ { "date": "2020-09-11T07:00:58Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.12.14-10.16.1.noarch", "product": { "name": "kernel-devel-rt-4.12.14-10.16.1.noarch", "product_id": "kernel-devel-rt-4.12.14-10.16.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.12.14-10.16.1.noarch", "product": { "name": "kernel-source-rt-4.12.14-10.16.1.noarch", "product_id": "kernel-source-rt-4.12.14-10.16.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.12.14-10.16.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.12.14-10.16.1.x86_64", "product_id": "cluster-md-kmp-rt-4.12.14-10.16.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.12.14-10.16.1.x86_64", "product": { "name": "dlm-kmp-rt-4.12.14-10.16.1.x86_64", "product_id": "dlm-kmp-rt-4.12.14-10.16.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.12.14-10.16.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.12.14-10.16.1.x86_64", "product_id": "gfs2-kmp-rt-4.12.14-10.16.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.12.14-10.16.1.x86_64", "product": { "name": "kernel-rt-4.12.14-10.16.1.x86_64", "product_id": "kernel-rt-4.12.14-10.16.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.12.14-10.16.1.x86_64", "product": { "name": "kernel-rt-base-4.12.14-10.16.1.x86_64", "product_id": "kernel-rt-base-4.12.14-10.16.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.12.14-10.16.1.x86_64", "product": { "name": "kernel-rt-devel-4.12.14-10.16.1.x86_64", "product_id": "kernel-rt-devel-4.12.14-10.16.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-4.12.14-10.16.1.x86_64", "product": { "name": "kernel-rt_debug-4.12.14-10.16.1.x86_64", "product_id": "kernel-rt_debug-4.12.14-10.16.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.12.14-10.16.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.12.14-10.16.1.x86_64", "product_id": "kernel-rt_debug-devel-4.12.14-10.16.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.12.14-10.16.1.x86_64", "product": { "name": "kernel-syms-rt-4.12.14-10.16.1.x86_64", "product_id": "kernel-syms-rt-4.12.14-10.16.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.12.14-10.16.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.12.14-10.16.1.x86_64", "product_id": "ocfs2-kmp-rt-4.12.14-10.16.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP5", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.12.14-10.16.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.12.14-10.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.12.14-10.16.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.12.14-10.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.12.14-10.16.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.12.14-10.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.12.14-10.16.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch" }, "product_reference": "kernel-devel-rt-4.12.14-10.16.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.12.14-10.16.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64" }, "product_reference": "kernel-rt-4.12.14-10.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.12.14-10.16.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64" }, "product_reference": "kernel-rt-base-4.12.14-10.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.12.14-10.16.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64" }, "product_reference": "kernel-rt-devel-4.12.14-10.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-4.12.14-10.16.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64" }, "product_reference": "kernel-rt_debug-4.12.14-10.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.12.14-10.16.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.12.14-10.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.12.14-10.16.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch" }, "product_reference": "kernel-source-rt-4.12.14-10.16.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.12.14-10.16.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64" }, "product_reference": "kernel-syms-rt-4.12.14-10.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.12.14-10.16.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.12.14-10.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-3639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3639" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3639", "url": "https://www.suse.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1085235 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085235" }, { "category": "external", "summary": "SUSE Bug 1085308 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085308" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092631 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092631" }, { "category": "external", "summary": "SUSE Bug 1092885 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092885" }, { "category": "external", "summary": "SUSE Bug 1094912 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1094912" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100394 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1100394" }, { "category": "external", "summary": "SUSE Bug 1102640 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1102640" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1105412" }, { "category": "external", "summary": "SUSE Bug 1111963 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1111963" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172781" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172782" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172783" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-11T07:00:58Z", "details": "moderate" } ], "title": "CVE-2018-3639" }, { "cve": "CVE-2020-0305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0305" } ], "notes": [ { "category": "general", "text": "In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0305", "url": "https://www.suse.com/security/cve/CVE-2020-0305" }, { "category": "external", "summary": "SUSE Bug 1174462 for CVE-2020-0305", "url": "https://bugzilla.suse.com/1174462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-11T07:00:58Z", "details": "moderate" } ], "title": "CVE-2020-0305" }, { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-11T07:00:58Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-14314", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14314" } ], "notes": [ { "category": "general", "text": "A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14314", "url": "https://www.suse.com/security/cve/CVE-2020-14314" }, { "category": "external", "summary": "SUSE Bug 1173798 for CVE-2020-14314", "url": "https://bugzilla.suse.com/1173798" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-11T07:00:58Z", "details": "moderate" } ], "title": "CVE-2020-14314" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-11T07:00:58Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14356" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14356", "url": "https://www.suse.com/security/cve/CVE-2020-14356" }, { "category": "external", "summary": "SUSE Bug 1175213 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1175213" }, { "category": "external", "summary": "SUSE Bug 1176392 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1176392" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-11T07:00:58Z", "details": "moderate" } ], "title": "CVE-2020-14356" }, { "cve": "CVE-2020-16166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16166" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16166", "url": "https://www.suse.com/security/cve/CVE-2020-16166" }, { "category": "external", "summary": "SUSE Bug 1174757 for CVE-2020-16166", "url": "https://bugzilla.suse.com/1174757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-11T07:00:58Z", "details": "moderate" } ], "title": "CVE-2020-16166" }, { "cve": "CVE-2020-24394", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24394" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24394", "url": "https://www.suse.com/security/cve/CVE-2020-24394" }, { "category": "external", "summary": "SUSE Bug 1175518 for CVE-2020-24394", "url": "https://bugzilla.suse.com/1175518" }, { "category": "external", "summary": "SUSE Bug 1175992 for CVE-2020-24394", "url": "https://bugzilla.suse.com/1175992" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-11T07:00:58Z", "details": "important" } ], "title": "CVE-2020-24394" } ] }
suse-su-2020:2517-1
Vulnerability from csaf_suse
Published
2020-09-04 11:34
Modified
2020-09-04 11:34
Summary
Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP1)
Description of the patch
This update for the Linux Kernel 4.12.14-197_45 fixes several issues.
The following security issues were fixed:
- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2020-15780: Fixed a lockdown bypass via injection of malicious ACPI tables via configfs (bsc#1174186).
- CVE-2020-1749: Fixed a flaw in IPsec where some IPv6 protocols were not encrypted (bsc#1165631).
Patchnames
SUSE-2020-2517,SUSE-SLE-Live-Patching-12-SP5-2020-2516,SUSE-SLE-Live-Patching-12-SP5-2020-2517,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2533
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-197_45 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).\n- CVE-2020-15780: Fixed a lockdown bypass via injection of malicious ACPI tables via configfs (bsc#1174186).\n- CVE-2020-1749: Fixed a flaw in IPsec where some IPv6 protocols were not encrypted (bsc#1165631).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2517,SUSE-SLE-Live-Patching-12-SP5-2020-2516,SUSE-SLE-Live-Patching-12-SP5-2020-2517,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2533", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2517-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2517-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202517-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2517-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007366.html" }, { "category": "self", "summary": "SUSE Bug 1165631", "url": "https://bugzilla.suse.com/1165631" }, { "category": "self", "summary": "SUSE Bug 1174186", "url": "https://bugzilla.suse.com/1174186" }, { "category": "self", "summary": "SUSE Bug 1174247", "url": "https://bugzilla.suse.com/1174247" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1749 page", "url": "https://www.suse.com/security/cve/CVE-2020-1749/" } ], "title": "Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP1)", "tracking": { "current_release_date": "2020-09-04T11:34:22Z", "generator": { "date": "2020-09-04T11:34:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2517-1", "initial_release_date": "2020-09-04T11:34:22Z", "revision_history": [ { "date": "2020-09-04T11:34:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_26-default-2-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_26-default-2-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_26-default-2-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_23-default-2-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_23-default-2-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_23-default-2-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_45-default-2-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_45-default-2-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_45-default-2-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_26-default-2-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-122_26-default-2-2.2.s390x", "product_id": "kgraft-patch-4_12_14-122_26-default-2-2.2.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_23-default-2-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-122_23-default-2-2.2.s390x", "product_id": "kgraft-patch-4_12_14-122_23-default-2-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_26-default-2-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_26-default-2-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_26-default-2-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_23-default-2-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_23-default-2-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_23-default-2-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_45-default-2-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_45-default-2-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-197_45-default-2-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-2-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-2-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-2-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-2-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-2-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-2-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_23-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_23-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-2-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-2-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_45-default-2-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-2-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_45-default-2-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_45-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-2-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_45-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:34:22Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:34:22Z", "details": "important" } ], "title": "CVE-2020-15780" }, { "cve": "CVE-2020-1749", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1749" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1749", "url": "https://www.suse.com/security/cve/CVE-2020-1749" }, { "category": "external", "summary": "SUSE Bug 1165629 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165629" }, { "category": "external", "summary": "SUSE Bug 1165631 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165631" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177513" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1189302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_23-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-2-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-2-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_45-default-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T11:34:22Z", "details": "important" } ], "title": "CVE-2020-1749" } ] }
ghsa-x3f8-pg55-6qfg
Vulnerability from github
Published
2022-05-24 22:33
Modified
2023-02-13 00:30
Severity ?
VLAI Severity ?
Details
A flaw was found in the Linux kernel’s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
{ "affected": [], "aliases": [ "CVE-2020-14331" ], "database_specific": { "cwe_ids": [ "CWE-787" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-09-15T19:15:00Z", "severity": "HIGH" }, "details": "A flaw was found in the Linux kernel\u2019s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "id": "GHSA-x3f8-pg55-6qfg", "modified": "2023-02-13T00:30:53Z", "published": "2022-05-24T22:33:53Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14331" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2020:4286" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2020:4289" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2020:5023" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2020:5026" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2020-14331" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858679" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html" }, { "type": "WEB", "url": "https://lists.openwall.net/linux-kernel/2020/07/29/234" }, { "type": "WEB", "url": "https://www.openwall.com/lists/oss-security/2020/07/28/2" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
rhsa-2020:4289
Vulnerability from csaf_redhat
Published
2020-10-20 09:02
Modified
2025-08-04 07:10
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351)
* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)
* kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt (CVE-2020-14385)
* kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege (CVE-2020-14386)
* kernel: kernel: buffer over write in vgacon_scroll (CVE-2020-14331)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* kernel-rt: update RT source tree to the RHEL-8.2.z Batch#4 source tree (BZ#1877921)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351)\n\n* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)\n\n* kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt (CVE-2020-14385)\n\n* kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege (CVE-2020-14386)\n\n* kernel: kernel: buffer over write in vgacon_scroll (CVE-2020-14331)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.2.z Batch#4 source tree (BZ#1877921)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4289", "url": "https://access.redhat.com/errata/RHSA-2020:4289" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "1858679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858679" }, { "category": "external", "summary": "1874800", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874800" }, { "category": "external", "summary": "1875699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875699" }, { "category": "external", "summary": "1886521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886521" }, { "category": "external", "summary": "1886529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886529" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4289.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-04T07:10:27+00:00", "generator": { "date": "2025-08-04T07:10:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:4289", "initial_release_date": "2020-10-20T09:02:14+00:00", "revision_history": [ { "date": "2020-10-20T09:02:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-10-20T09:02:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T07:10:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::nfv" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::realtime" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product": { "name": "kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_id": "kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.28.1.rt13.77.el8_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "product": { "name": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "product_id": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.28.1.rt13.77.el8_2?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src" }, "product_reference": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src" }, "product_reference": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Nguyen" ], "organization": "Google" }, { "names": [ "Intel" ] } ], "cve": "CVE-2020-12351", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886521" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u2019s Bluetooth implementation handled L2CAP (Logical Link Control and Adaptation Protocol) packets with A2MP (Alternate MAC-PHY Manager Protocol) CID (Channel Identifier). This flaw allows a remote attacker in an adjacent range to crash the system, causing a denial of service or potentially executing arbitrary code on the system by sending a specially crafted L2CAP packet. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: bluetooth: type confusion while processing AMP packets", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7 is affected starting with the Red Hat Enterprise Linux 7.4 GA kernel version 3.10.0-693 onward.\n\nFor Red Hat OpenShift Container Platform, while the cluster nodes may be running an underlying kernel that\u0027s affected by this flaw present, both virtual and physical hosts in a production environment will generally have the mitigation already in place of having Bluetooth hardware either not present, or not enabled.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "RHBZ#1886521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886521" }, { "category": "external", "summary": "RHSB-BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12351", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12351" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq", "url": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq", "url": "https://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-2-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-2-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html" }, { "category": "external", "summary": "https://www.zdnet.com/article/google-warns-of-severe-bleedingtooth-bluetooth-flaw-in-linux-kernel/", "url": "https://www.zdnet.com/article/google-warns-of-severe-bleedingtooth-bluetooth-flaw-in-linux-kernel/" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T09:02:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4289" }, { "category": "workaround", "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: net: bluetooth: type confusion while processing AMP packets" }, { "acknowledgments": [ { "names": [ "Andy Nguyen" ], "organization": "Google" }, { "names": [ "Intel" ] } ], "cve": "CVE-2020-12352", "cwe": { "id": "CWE-201", "name": "Insertion of Sensitive Information Into Sent Data" }, "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886529" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found in the way Linux kernel\u2019s Bluetooth stack implementation handled initialization of stack memory when handling certain AMP (Alternate MAC-PHY Manager Protocol) packets. This flaw allows a remote attacker in an adjacent range to leak small portions of stack memory on the system by sending specially crafted AMP packets. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: bluetooth: information leak when processing certain AMP packets", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "RHBZ#1886529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886529" }, { "category": "external", "summary": "RHSB-BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12352", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12352" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12352", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12352" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq", "url": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T09:02:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4289" }, { "category": "workaround", "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net: bluetooth: information leak when processing certain AMP packets" }, { "acknowledgments": [ { "names": [ "Yunhai Zhang" ], "organization": "NSFOCUS Security Team" } ], "cve": "CVE-2020-14331", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2020-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1858679" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: kernel: buffer over write in vgacon_scroll", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as a having Moderate impact, because only local user with access to VGA console can trigger it (for example if booting with param \"nomodeset\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "RHBZ#1858679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858679" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14331", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14331" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14331", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14331" } ], "release_date": "2020-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T09:02:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4289" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: kernel: buffer over write in vgacon_scroll" }, { "acknowledgments": [ { "names": [ "Dr. David Alan Gilbert" ], "organization": "redhat.com" } ], "cve": "CVE-2020-14385", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "discovery_date": "2020-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1874800" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A failure of the file system metadata validator in XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt", "title": "Vulnerability summary" }, { "category": "other", "text": "Only local users, including unprivileged users in a cointainer, can trigger this flaw. However, the impact could be high, especially on multi-tenant systems, because after the attack the system rendered inaccessible for some time (at least until reboot), so the impact has been increased to Important.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14385" }, { "category": "external", "summary": "RHBZ#1874800", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874800" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14385", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14385" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14385", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14385" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4020438fab05364018c91f7e02ebdd192085933", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4020438fab05364018c91f7e02ebdd192085933" } ], "release_date": "2020-08-25T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T09:02:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4289" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt" }, { "acknowledgments": [ { "names": [ "Or Cohen" ], "organization": "paloaltonetworks.com" } ], "cve": "CVE-2020-14386", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2020-09-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1875699" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege", "title": "Vulnerability summary" }, { "category": "other", "text": "Only local users with CAP_NET_RAW capability enabled can trigger this issue.\n\nFor OpenShift Container Platform 4, pods in the default restricted SCC are granted CAP_NET_RAW by default. An attacker can exploit this if they can run arbitrary container images on the target cluster.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "RHBZ#1875699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875699" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14386", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14386" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14386", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14386" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=acf69c946233259ab4d64f8869d4037a198c7f06", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=acf69c946233259ab4d64f8869d4037a198c7f06" }, { "category": "external", "summary": "https://seclists.org/oss-sec/2020/q3/146", "url": "https://seclists.org/oss-sec/2020/q3/146" } ], "release_date": "2020-09-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T09:02:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4289" }, { "category": "workaround", "details": "If the CAP_NET_RAW capability disabled by default (which is true for Red Hat Enterprise Linux), then only a privileged user can trigger this bug. The mitigation is to disable CAP_NET_RAW capability for regular users and for executables.\n\nOn Red Hat Enterprise Linux 8 CAP_NET_RAW capability can be also gained by exploiting unprivileged user namespaces. The mitigation is to disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOpenShift Container Platform 4.5 and 4.4 this can be mitigated by removing `CAP_NET_RAW` from the default cri-o capabilities provided to pods (NOTE: This may prevent `ping` from working in unprivileged pods. This fix has not been validated for OpenShift 4.3 or below):\n```\napiVersion: machineconfiguration.openshift.io/v1\nkind: MachineConfig\nmetadata:\n labels:\n machineconfiguration.openshift.io/role: worker\n name: 50-reset-crio-capabilities\nspec:\n config:\n ignition:\n version: 2.2.0\n storage:\n files:\n - contents:\n source: data:text/plain;charset=utf-8;base64,W2NyaW8ucnVudGltZV0KZGVmYXVsdF9jYXBhYmlsaXRpZXMgPSBbCiAgICAiQ0hPV04iLAogICAgIkRBQ19PVkVSUklERSIsCiAgICAiRlNFVElEIiwKICAgICJGT1dORVIiLAogICAgIlNFVEdJRCIsCiAgICAiU0VUVUlEIiwKICAgICJTRVRQQ0FQIiwKICAgICJORVRfQklORF9TRVJWSUNFIiwKICAgICJTWVNfQ0hST09UIiwKICAgICJLSUxMIiwKXQo=\n filesystem: root\n mode: 0644\n path: /etc/crio/crio.conf.d/reset-crio-capabilities.conf\n```\n\nCreate this MachineConfig object via e.g. `oc apply`. More information about MachineConfig can be found here: \nhttps://github.com/openshift/machine-config-operator\nhttps://docs.openshift.com/container-platform/4.5/architecture/architecture-rhcos.html\n\nIn order to monitor the rollout of this change, use `oc describe machineconfigpool/worker`.\n\nCheck for any pods which start to crash after this is applied; they may need to be adjusted request `CAP_NET_RAW` explicitly. More information:\nhttps://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-capabilities-for-a-container\nhttps://docs.openshift.com/container-platform/4.5/authentication/managing-security-context-constraints.html", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.28.1.rt13.77.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege" } ] }
rhsa-2020:4286
Vulnerability from csaf_redhat
Published
2020-10-20 08:52
Modified
2025-08-04 07:10
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351)
* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)
* kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt (CVE-2020-14385)
* kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege (CVE-2020-14386)
* kernel: kernel: buffer over write in vgacon_scroll (CVE-2020-14331)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [mlx5] stale ethtool steering rules remain after moving back to legacy mode (BZ#1857777)
* 50% cpu in masked_flow_update with pop to pod TCP_RR (BZ#1859216)
* take into account GSO and fragmented packets in execute_check_pkt_len action (BZ#1860169)
* RHEL8.1 - scsi: ibmvfc: Avoid loss of all paths during SVC node reboot (BZ#1866371)
* RHEL8.3 Pre-Beta - smc: SMC connections hang with later-level implementations (BZ#1866390)
* Incorrect pinning of IRQ threads on isolated CPUs by drivers that use cpumask_local_spread() (BZ#1867174)
* [RHEL8] Fixes for DEADLINE scheduler class (BZ#1867612)
* RHEL8.1 - s390/pci: Fix unexpected write combine on resource (BZ#1869276)
* dm multipath: fix spurious failures during IO completion [EIOP-8345] (BZ#1869386)
* IO on virtio-scsi hangs when running cpu hotplug test (BZ#1869779)
* store_rps_map doesn't accept an empty bitmask, which is required for disabling RPS on a queue (BZ#1870181)
* Memory registration cache data corruption possible, fix requires backporting (BZ#1872424)
* fix another case of wait list corruption for PSM/sdma (BZ#1872766)
* [RHEL-8] Segmentation fault (core dumped) when fi_bw -e msg -v -T 1 -p "verbs" (BZ#1872771)
* fix mounting and inode number handling on s390x (BZ#1875787)
* failure to enter nohz_full mode for non SCHED_FIFO tasks (BZ#1877417)
* Secure boot key is not loaded with kernel-4.18.0-232.el8.x86_64 / shim-x64-15-15 (BZ#1877528)
* [RHEL-8.3] Kdump failed to start when secure boot enabled: kexec_file_load failed: Required key not available (BZ#1877530)
* [RHEL-8.3] Kdump/kexec kernel panicked on EFI boot: general protection fault: 0000 [#1] SMP PTI (BZ#1879988)
* Sleeping or scheduling after sched_cpu_dying() led to "scheduling while atomic" and BUG at kernel/cpu.c:907! (BZ#1880081)
* [conntrack] udp packet reverse NAT occasionally fail when race condition request combination with the DNAT load balancing rules (BZ#1882095)
* [Regression] RHEL8.3 Beta - Do not initiate shutdown for EPOW_SHUTDOWN_ON_UPS event (BZ#1882243)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351)\n\n* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)\n\n* kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt (CVE-2020-14385)\n\n* kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege (CVE-2020-14386)\n\n* kernel: kernel: buffer over write in vgacon_scroll (CVE-2020-14331)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [mlx5] stale ethtool steering rules remain after moving back to legacy mode (BZ#1857777)\n\n* 50% cpu in masked_flow_update with pop to pod TCP_RR (BZ#1859216)\n\n* take into account GSO and fragmented packets in execute_check_pkt_len action (BZ#1860169)\n\n* RHEL8.1 - scsi: ibmvfc: Avoid loss of all paths during SVC node reboot (BZ#1866371)\n\n* RHEL8.3 Pre-Beta - smc: SMC connections hang with later-level implementations (BZ#1866390)\n\n* Incorrect pinning of IRQ threads on isolated CPUs by drivers that use cpumask_local_spread() (BZ#1867174)\n\n* [RHEL8] Fixes for DEADLINE scheduler class (BZ#1867612)\n\n* RHEL8.1 - s390/pci: Fix unexpected write combine on resource (BZ#1869276)\n\n* dm multipath: fix spurious failures during IO completion [EIOP-8345] (BZ#1869386)\n\n* IO on virtio-scsi hangs when running cpu hotplug test (BZ#1869779)\n\n* store_rps_map doesn\u0027t accept an empty bitmask, which is required for disabling RPS on a queue (BZ#1870181)\n\n* Memory registration cache data corruption possible, fix requires backporting (BZ#1872424)\n\n* fix another case of wait list corruption for PSM/sdma (BZ#1872766)\n\n* [RHEL-8] Segmentation fault (core dumped) when fi_bw -e msg -v -T 1 -p \"verbs\" (BZ#1872771)\n\n* fix mounting and inode number handling on s390x (BZ#1875787)\n\n* failure to enter nohz_full mode for non SCHED_FIFO tasks (BZ#1877417)\n\n* Secure boot key is not loaded with kernel-4.18.0-232.el8.x86_64 / shim-x64-15-15 (BZ#1877528)\n\n* [RHEL-8.3] Kdump failed to start when secure boot enabled: kexec_file_load failed: Required key not available (BZ#1877530)\n\n* [RHEL-8.3] Kdump/kexec kernel panicked on EFI boot: general protection fault: 0000 [#1] SMP PTI (BZ#1879988)\n\n* Sleeping or scheduling after sched_cpu_dying() led to \"scheduling while atomic\" and BUG at kernel/cpu.c:907! (BZ#1880081)\n\n* [conntrack] udp packet reverse NAT occasionally fail when race condition request combination with the DNAT load balancing rules (BZ#1882095)\n\n* [Regression] RHEL8.3 Beta - Do not initiate shutdown for EPOW_SHUTDOWN_ON_UPS event (BZ#1882243)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4286", "url": "https://access.redhat.com/errata/RHSA-2020:4286" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "1858679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858679" }, { "category": "external", "summary": "1874800", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874800" }, { "category": "external", "summary": "1875699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875699" }, { "category": "external", "summary": "1886521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886521" }, { "category": "external", "summary": "1886529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886529" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4286.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-04T07:10:34+00:00", "generator": { "date": "2025-08-04T07:10:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:4286", "initial_release_date": "2020-10-20T08:52:37+00:00", "revision_history": [ { "date": "2020-10-20T08:52:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-10-20T08:52:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T07:10:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "perf-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "perf-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.28.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "product": { "name": "python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "product_id": "python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.28.1.el8_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "perf-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "perf-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.28.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "product": { "name": "python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "product_id": "python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.28.1.el8_2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "perf-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "perf-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.28.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "product": { "name": "python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "product_id": "python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.28.1.el8_2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "bpftool-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "bpftool-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "perf-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "perf-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.28.1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.28.1.el8_2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-193.28.1.el8_2.src", "product": { "name": "kernel-0:4.18.0-193.28.1.el8_2.src", "product_id": "kernel-0:4.18.0-193.28.1.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.28.1.el8_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "product": { "name": "kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "product_id": "kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.28.1.el8_2?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "product": { "name": "kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "product_id": "kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.28.1.el8_2?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "bpftool-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.28.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src" }, "product_reference": "kernel-0:4.18.0-193.28.1.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-193.28.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch" }, "product_reference": "kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "perf-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "perf-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "perf-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "perf-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "bpftool-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.28.1.el8_2.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src" }, "product_reference": "kernel-0:4.18.0-193.28.1.el8_2.src", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-193.28.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch" }, "product_reference": "kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "perf-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "perf-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "perf-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "perf-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Nguyen" ], "organization": "Google" }, { "names": [ "Intel" ] } ], "cve": "CVE-2020-12351", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2020-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886521" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u2019s Bluetooth implementation handled L2CAP (Logical Link Control and Adaptation Protocol) packets with A2MP (Alternate MAC-PHY Manager Protocol) CID (Channel Identifier). This flaw allows a remote attacker in an adjacent range to crash the system, causing a denial of service or potentially executing arbitrary code on the system by sending a specially crafted L2CAP packet. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: bluetooth: type confusion while processing AMP packets", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7 is affected starting with the Red Hat Enterprise Linux 7.4 GA kernel version 3.10.0-693 onward.\n\nFor Red Hat OpenShift Container Platform, while the cluster nodes may be running an underlying kernel that\u0027s affected by this flaw present, both virtual and physical hosts in a production environment will generally have the mitigation already in place of having Bluetooth hardware either not present, or not enabled.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ], "known_not_affected": [ "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "RHBZ#1886521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886521" }, { "category": "external", "summary": "RHSB-BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12351", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12351" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12351" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq", "url": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq", "url": "https://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-2-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-2-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html" }, { "category": "external", "summary": "https://www.zdnet.com/article/google-warns-of-severe-bleedingtooth-bluetooth-flaw-in-linux-kernel/", "url": "https://www.zdnet.com/article/google-warns-of-severe-bleedingtooth-bluetooth-flaw-in-linux-kernel/" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T08:52:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4286" }, { "category": "workaround", "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: net: bluetooth: type confusion while processing AMP packets" }, { "acknowledgments": [ { "names": [ "Andy Nguyen" ], "organization": "Google" }, { "names": [ "Intel" ] } ], "cve": "CVE-2020-12352", "cwe": { "id": "CWE-201", "name": "Insertion of Sensitive Information Into Sent Data" }, "discovery_date": "2020-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886529" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found in the way Linux kernel\u2019s Bluetooth stack implementation handled initialization of stack memory when handling certain AMP (Alternate MAC-PHY Manager Protocol) packets. This flaw allows a remote attacker in an adjacent range to leak small portions of stack memory on the system by sending specially crafted AMP packets. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: bluetooth: information leak when processing certain AMP packets", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ], "known_not_affected": [ "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "RHBZ#1886529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886529" }, { "category": "external", "summary": "RHSB-BleedingTooth", "url": "https://access.redhat.com/security/vulnerabilities/BleedingTooth" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12352", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12352" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12352", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12352" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq", "url": "https://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq" }, { "category": "external", "summary": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/", "url": "https://lore.kernel.org/linux-bluetooth/20200806181714.3216076-1-luiz.dentz@gmail.com/" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T08:52:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4286" }, { "category": "workaround", "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at BIOS level which will also provide an effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net: bluetooth: information leak when processing certain AMP packets" }, { "acknowledgments": [ { "names": [ "Yunhai Zhang" ], "organization": "NSFOCUS Security Team" } ], "cve": "CVE-2020-14331", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2020-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1858679" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: kernel: buffer over write in vgacon_scroll", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as a having Moderate impact, because only local user with access to VGA console can trigger it (for example if booting with param \"nomodeset\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ], "known_not_affected": [ "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "RHBZ#1858679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858679" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14331", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14331" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14331", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14331" } ], "release_date": "2020-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T08:52:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4286" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: kernel: buffer over write in vgacon_scroll" }, { "acknowledgments": [ { "names": [ "Dr. David Alan Gilbert" ], "organization": "redhat.com" } ], "cve": "CVE-2020-14385", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "discovery_date": "2020-08-26T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1874800" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A failure of the file system metadata validator in XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt", "title": "Vulnerability summary" }, { "category": "other", "text": "Only local users, including unprivileged users in a cointainer, can trigger this flaw. However, the impact could be high, especially on multi-tenant systems, because after the attack the system rendered inaccessible for some time (at least until reboot), so the impact has been increased to Important.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ], "known_not_affected": [ "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14385" }, { "category": "external", "summary": "RHBZ#1874800", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874800" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14385", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14385" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14385", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14385" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4020438fab05364018c91f7e02ebdd192085933", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4020438fab05364018c91f7e02ebdd192085933" } ], "release_date": "2020-08-25T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T08:52:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4286" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt" }, { "acknowledgments": [ { "names": [ "Or Cohen" ], "organization": "paloaltonetworks.com" } ], "cve": "CVE-2020-14386", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2020-09-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1875699" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege", "title": "Vulnerability summary" }, { "category": "other", "text": "Only local users with CAP_NET_RAW capability enabled can trigger this issue.\n\nFor OpenShift Container Platform 4, pods in the default restricted SCC are granted CAP_NET_RAW by default. An attacker can exploit this if they can run arbitrary container images on the target cluster.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ], "known_not_affected": [ "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "RHBZ#1875699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875699" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14386", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14386" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14386", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14386" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=acf69c946233259ab4d64f8869d4037a198c7f06", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=acf69c946233259ab4d64f8869d4037a198c7f06" }, { "category": "external", "summary": "https://seclists.org/oss-sec/2020/q3/146", "url": "https://seclists.org/oss-sec/2020/q3/146" } ], "release_date": "2020-09-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-20T08:52:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:4286" }, { "category": "workaround", "details": "If the CAP_NET_RAW capability disabled by default (which is true for Red Hat Enterprise Linux), then only a privileged user can trigger this bug. The mitigation is to disable CAP_NET_RAW capability for regular users and for executables.\n\nOn Red Hat Enterprise Linux 8 CAP_NET_RAW capability can be also gained by exploiting unprivileged user namespaces. The mitigation is to disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOpenShift Container Platform 4.5 and 4.4 this can be mitigated by removing `CAP_NET_RAW` from the default cri-o capabilities provided to pods (NOTE: This may prevent `ping` from working in unprivileged pods. This fix has not been validated for OpenShift 4.3 or below):\n```\napiVersion: machineconfiguration.openshift.io/v1\nkind: MachineConfig\nmetadata:\n labels:\n machineconfiguration.openshift.io/role: worker\n name: 50-reset-crio-capabilities\nspec:\n config:\n ignition:\n version: 2.2.0\n storage:\n files:\n - contents:\n source: data:text/plain;charset=utf-8;base64,W2NyaW8ucnVudGltZV0KZGVmYXVsdF9jYXBhYmlsaXRpZXMgPSBbCiAgICAiQ0hPV04iLAogICAgIkRBQ19PVkVSUklERSIsCiAgICAiRlNFVElEIiwKICAgICJGT1dORVIiLAogICAgIlNFVEdJRCIsCiAgICAiU0VUVUlEIiwKICAgICJTRVRQQ0FQIiwKICAgICJORVRfQklORF9TRVJWSUNFIiwKICAgICJTWVNfQ0hST09UIiwKICAgICJLSUxMIiwKXQo=\n filesystem: root\n mode: 0644\n path: /etc/crio/crio.conf.d/reset-crio-capabilities.conf\n```\n\nCreate this MachineConfig object via e.g. `oc apply`. More information about MachineConfig can be found here: \nhttps://github.com/openshift/machine-config-operator\nhttps://docs.openshift.com/container-platform/4.5/architecture/architecture-rhcos.html\n\nIn order to monitor the rollout of this change, use `oc describe machineconfigpool/worker`.\n\nCheck for any pods which start to crash after this is applied; they may need to be adjusted request `CAP_NET_RAW` explicitly. More information:\nhttps://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-capabilities-for-a-container\nhttps://docs.openshift.com/container-platform/4.5/authentication/managing-security-context-constraints.html", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.28.1.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.28.1.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.28.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege" } ] }
rhsa-2020:5026
Vulnerability from csaf_redhat
Published
2020-11-10 13:21
Modified
2025-08-04 12:05
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: kernel: buffer over write in vgacon_scroll (CVE-2020-14331)
* kernel: net-sysfs: *_queue_add_kobject refcount issue (CVE-2019-20811)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [RHEL-7.9] net/ipv6/ip6_flowlabel.c:85 suspicious rcu_dereference_check() usage! (kernel-rt-debug) (BZ#1836846)
* md/raid: sleeping function called from invalid context triggered by CKI storage/swraid/trim test (BZ#1857872)
* Infinite looping when trying to acquire eventpoll->mtx during eventpoll_release_file, 2nd try (BZ#1877695)
* kernel-rt: update to the latest RHEL7.9.z1 source tree (BZ#1883995)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: kernel: buffer over write in vgacon_scroll (CVE-2020-14331)\n\n* kernel: net-sysfs: *_queue_add_kobject refcount issue (CVE-2019-20811)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [RHEL-7.9] net/ipv6/ip6_flowlabel.c:85 suspicious rcu_dereference_check() usage! (kernel-rt-debug) (BZ#1836846)\n\n* md/raid: sleeping function called from invalid context triggered by CKI storage/swraid/trim test (BZ#1857872)\n\n* Infinite looping when trying to acquire eventpoll-\u003emtx during eventpoll_release_file, 2nd try (BZ#1877695)\n\n* kernel-rt: update to the latest RHEL7.9.z1 source tree (BZ#1883995)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:5026", "url": "https://access.redhat.com/errata/RHSA-2020:5026" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1846439", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846439" }, { "category": "external", "summary": "1858679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858679" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5026.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-04T12:05:14+00:00", "generator": { "date": "2025-08-04T12:05:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:5026", "initial_release_date": "2020-11-10T13:21:49+00:00", "revision_history": [ { "date": "2020-11-10T13:21:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-11-10T13:21:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T12:05:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product": { "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for Real Time (v. 7)", "product": { "name": "Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product": { "name": "kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_id": "kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.6.1.rt56.1139.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product": { "name": "kernel-rt-debug-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_id": "kernel-rt-debug-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-1160.6.1.rt56.1139.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product": { "name": "kernel-rt-debug-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_id": "kernel-rt-debug-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-1160.6.1.rt56.1139.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_id": "kernel-rt-debug-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-1160.6.1.rt56.1139.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product": { "name": "kernel-rt-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_id": "kernel-rt-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-1160.6.1.rt56.1139.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product": { "name": "kernel-rt-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_id": "kernel-rt-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-1160.6.1.rt56.1139.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product": { "name": "kernel-rt-trace-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_id": "kernel-rt-trace-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-1160.6.1.rt56.1139.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product": { "name": "kernel-rt-trace-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_id": "kernel-rt-trace-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-1160.6.1.rt56.1139.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_id": "kernel-rt-trace-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-1160.6.1.rt56.1139.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-1160.6.1.rt56.1139.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-1160.6.1.rt56.1139.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_id": "kernel-rt-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-1160.6.1.rt56.1139.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-1160.6.1.rt56.1139.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-1160.6.1.rt56.1139.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-1160.6.1.rt56.1139.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-1160.6.1.rt56.1139.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.src", "product": { "name": "kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.src", "product_id": "kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.6.1.rt56.1139.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:3.10.0-1160.6.1.rt56.1139.el7.noarch", "product": { "name": "kernel-rt-doc-0:3.10.0-1160.6.1.rt56.1139.el7.noarch", "product_id": "kernel-rt-doc-0:3.10.0-1160.6.1.rt56.1139.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-1160.6.1.rt56.1139.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.src", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-1160.6.1.rt56.1139.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.6.1.rt56.1139.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-1160.6.1.rt56.1139.el7.noarch", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.src as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.src", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-1160.6.1.rt56.1139.el7.noarch as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.6.1.rt56.1139.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-1160.6.1.rt56.1139.el7.noarch", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)", "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.9.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-20811", "cwe": { "id": "CWE-460", "name": "Improper Cleanup on Thrown Exception" }, "discovery_date": "2020-06-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1846439" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the rx_queue_add_kobject and netdev_queue_add_kobject functions in the Linux kernel handled refcounting of certain objects. This flaw allows a local user who can trigger the error code path to use this vulnerability to disturb the integrity of the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net-sysfs: *_queue_add_kobject refcount issue", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error code path (privileges).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.6.1.rt56.1139.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.6.1.rt56.1139.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20811" }, { "category": "external", "summary": "RHBZ#1846439", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846439" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20811", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20811" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a3e23f719f5c4a38ffb3d30c8d7632a4ed8ccd9e", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a3e23f719f5c4a38ffb3d30c8d7632a4ed8ccd9e" } ], "release_date": "2019-03-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-10T13:21:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.6.1.rt56.1139.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.6.1.rt56.1139.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5026" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.6.1.rt56.1139.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.6.1.rt56.1139.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.6.1.rt56.1139.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.6.1.rt56.1139.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: net-sysfs: *_queue_add_kobject refcount issue" }, { "acknowledgments": [ { "names": [ "Yunhai Zhang" ], "organization": "NSFOCUS Security Team" } ], "cve": "CVE-2020-14331", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2020-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1858679" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: kernel: buffer over write in vgacon_scroll", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as a having Moderate impact, because only local user with access to VGA console can trigger it (for example if booting with param \"nomodeset\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.6.1.rt56.1139.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.6.1.rt56.1139.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "RHBZ#1858679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858679" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14331", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14331" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14331", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14331" } ], "release_date": "2020-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-10T13:21:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.6.1.rt56.1139.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.6.1.rt56.1139.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5026" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.6.1.rt56.1139.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.6.1.rt56.1139.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.src", "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.6.1.rt56.1139.el7.noarch", "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.src", "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.6.1.rt56.1139.el7.noarch", "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64", "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.6.1.rt56.1139.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: kernel: buffer over write in vgacon_scroll" } ] }
rhsa-2020:5023
Vulnerability from csaf_redhat
Published
2020-11-10 13:37
Modified
2025-08-04 12:05
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: buffer over write in vgacon_scroll (CVE-2020-14331)
* kernel: net-sysfs: *_queue_add_kobject refcount issue (CVE-2019-20811)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [OSP13,mlx5] SRIOV VF still sending traffic when PF is down (BZ#1733181)
* gpf panic in virtio_check_driver_offered_fxature+6 when running sg_inq on a dm map for a lost virtio_blk (BZ#1811893)
* GPF panic in qlt_free_session_done+626 (BZ#1826127)
* [ Brazos ] "Core(s) per socket" and "Socket" values are interchanged in lscpu output. (kernel) (BZ#1826306)
* megaraid Aero: call trace observed during reboots (BZ#1828312)
* Crash in mptscsih_io_done() due to buffer overrun in sense_buf_pool (BZ#1829803)
* The qedf driver fails to re-establish the online F/C port state when the downstream F/C port is toggled unless a LIP is forced (BZ#1836443)
* tcp_fragment() limit causes packet drop under normal TCP load (BZ#1847765)
* ip link command shows state as UNKNOWN for MACVLAN interface (BZ#1848950)
* Lenovo TS 7Z60 Cooper Lake: PCI BAR firmware bug (BZ#1849223)
* [RHEL-7/mlx4] ipoib_flush ipoib_ib_dev_flush_light [ib_ipoib] (BZ#1858707)
* Uprobes crashes processes under GDB - SIGTRAP and SIGSEGV (BZ#1861396)
* kernel-3.10.0-1127.19.1.el7.x86_64 crashes after an SSH connection attempt when running as a Xen PV guest on AMD Epyc Rome (BZ#1882468)
* Null ptr deref after nf_reinject->nf_queue_entry_release_refs hits Attempt to release error doing inet_sock_destruct() (BZ#1885682)
Users of kernel are advised to upgrade to these updated packages, which fix these bugs.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: buffer over write in vgacon_scroll (CVE-2020-14331)\n\n* kernel: net-sysfs: *_queue_add_kobject refcount issue (CVE-2019-20811)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [OSP13,mlx5] SRIOV VF still sending traffic when PF is down (BZ#1733181)\n\n* gpf panic in virtio_check_driver_offered_fxature+6 when running sg_inq on a dm map for a lost virtio_blk (BZ#1811893)\n\n* GPF panic in qlt_free_session_done+626 (BZ#1826127)\n\n* [ Brazos ] \"Core(s) per socket\" and \"Socket\" values are interchanged in lscpu output. (kernel) (BZ#1826306)\n\n* megaraid Aero: call trace observed during reboots (BZ#1828312)\n\n* Crash in mptscsih_io_done() due to buffer overrun in sense_buf_pool (BZ#1829803)\n\n* The qedf driver fails to re-establish the online F/C port state when the downstream F/C port is toggled unless a LIP is forced (BZ#1836443)\n\n* tcp_fragment() limit causes packet drop under normal TCP load (BZ#1847765)\n\n* ip link command shows state as UNKNOWN for MACVLAN interface (BZ#1848950)\n\n* Lenovo TS 7Z60 Cooper Lake: PCI BAR firmware bug (BZ#1849223)\n\n* [RHEL-7/mlx4] ipoib_flush ipoib_ib_dev_flush_light [ib_ipoib] (BZ#1858707)\n\n* Uprobes crashes processes under GDB - SIGTRAP and SIGSEGV (BZ#1861396)\n\n* kernel-3.10.0-1127.19.1.el7.x86_64 crashes after an SSH connection attempt when running as a Xen PV guest on AMD Epyc Rome (BZ#1882468)\n\n* Null ptr deref after nf_reinject-\u003enf_queue_entry_release_refs hits Attempt to release error doing inet_sock_destruct() (BZ#1885682)\n\nUsers of kernel are advised to upgrade to these updated packages, which fix these bugs.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:5023", "url": "https://access.redhat.com/errata/RHSA-2020:5023" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1846439", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846439" }, { "category": "external", "summary": "1858679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858679" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5023.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-04T12:05:21+00:00", "generator": { "date": "2025-08-04T12:05:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:5023", "initial_release_date": "2020-11-10T13:37:31+00:00", "revision_history": [ { "date": "2020-11-10T13:37:31+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-11-10T13:37:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T12:05:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:3.10.0-1160.6.1.el7.x86_64", "product": { "name": "bpftool-0:3.10.0-1160.6.1.el7.x86_64", "product_id": "bpftool-0:3.10.0-1160.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-1160.6.1.el7.x86_64", "product": { "name": "kernel-0:3.10.0-1160.6.1.el7.x86_64", "product_id": "kernel-0:3.10.0-1160.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-1160.6.1.el7.x86_64", "product": { "name": "perf-0:3.10.0-1160.6.1.el7.x86_64", "product_id": "perf-0:3.10.0-1160.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-1160.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-1160.6.1.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-1160.6.1.el7.x86_64", "product_id": "python-perf-0:3.10.0-1160.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "product": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "product_id": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1160.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.6.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.6.1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-1160.6.1.el7.src", "product": { "name": "kernel-0:3.10.0-1160.6.1.el7.src", "product_id": "kernel-0:3.10.0-1160.6.1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.6.1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1160.6.1.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "product_id": "kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1160.6.1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:3.10.0-1160.6.1.el7.s390x", "product": { "name": "bpftool-0:3.10.0-1160.6.1.el7.s390x", "product_id": "bpftool-0:3.10.0-1160.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-1160.6.1.el7.s390x", "product": { "name": "kernel-0:3.10.0-1160.6.1.el7.s390x", "product_id": "kernel-0:3.10.0-1160.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "product_id": "kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "product_id": "kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "product_id": "kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1160.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1160.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-1160.6.1.el7.s390x", "product": { "name": "perf-0:3.10.0-1160.6.1.el7.s390x", "product_id": "perf-0:3.10.0-1160.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-1160.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-1160.6.1.el7.s390x", "product": { "name": "python-perf-0:3.10.0-1160.6.1.el7.s390x", "product_id": "python-perf-0:3.10.0-1160.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "product": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "product_id": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1160.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1160.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.6.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.6.1.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:3.10.0-1160.6.1.el7.ppc64", "product": { "name": "bpftool-0:3.10.0-1160.6.1.el7.ppc64", "product_id": "bpftool-0:3.10.0-1160.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-1160.6.1.el7.ppc64", "product": { "name": "kernel-0:3.10.0-1160.6.1.el7.ppc64", "product_id": "kernel-0:3.10.0-1160.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-1160.6.1.el7.ppc64", "product": { "name": "perf-0:3.10.0-1160.6.1.el7.ppc64", "product_id": "perf-0:3.10.0-1160.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-1160.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-1160.6.1.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-1160.6.1.el7.ppc64", "product_id": "python-perf-0:3.10.0-1160.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "product": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "product_id": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1160.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.6.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.6.1.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "product": { "name": "bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "product_id": "bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-1160.6.1.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-1160.6.1.el7.ppc64le", "product_id": "kernel-0:3.10.0-1160.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-1160.6.1.el7.ppc64le", "product": { "name": "perf-0:3.10.0-1160.6.1.el7.ppc64le", "product_id": "perf-0:3.10.0-1160.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-1160.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "product_id": "python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "product": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "product_id": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1160.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.6.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.6.1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.src", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1160.6.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.src", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1160.6.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1160.6.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1160.6.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.src", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1160.6.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1160.6.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "bpftool-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.src", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-1160.6.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-20811", "cwe": { "id": "CWE-460", "name": "Improper Cleanup on Thrown Exception" }, "discovery_date": "2020-06-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1846439" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the rx_queue_add_kobject and netdev_queue_add_kobject functions in the Linux kernel handled refcounting of certain objects. This flaw allows a local user who can trigger the error code path to use this vulnerability to disturb the integrity of the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net-sysfs: *_queue_add_kobject refcount issue", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error code path (privileges).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" ], "known_not_affected": [ "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20811" }, { "category": "external", "summary": "RHBZ#1846439", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846439" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20811", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20811" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a3e23f719f5c4a38ffb3d30c8d7632a4ed8ccd9e", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a3e23f719f5c4a38ffb3d30c8d7632a4ed8ccd9e" } ], "release_date": "2019-03-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-10T13:37:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:5023" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: net-sysfs: *_queue_add_kobject refcount issue" }, { "acknowledgments": [ { "names": [ "Yunhai Zhang" ], "organization": "NSFOCUS Security Team" } ], "cve": "CVE-2020-14331", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2020-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1858679" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: kernel: buffer over write in vgacon_scroll", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as a having Moderate impact, because only local user with access to VGA console can trigger it (for example if booting with param \"nomodeset\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" ], "known_not_affected": [ "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "RHBZ#1858679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858679" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14331", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14331" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14331", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14331" } ], "release_date": "2020-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-10T13:37:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:5023" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Client-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Server-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Workstation-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.src", "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.6.1.el7.noarch", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.6.1.el7.x86_64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.ppc64le", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.s390x", "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.6.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: kernel: buffer over write in vgacon_scroll" } ] }
gsd-2020-14331
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
A flaw was found in the Linux kernel’s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2020-14331", "description": "A flaw was found in the Linux kernel\u2019s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "id": "GSD-2020-14331", "references": [ "https://www.suse.com/security/cve/CVE-2020-14331.html", "https://access.redhat.com/errata/RHSA-2020:5026", "https://access.redhat.com/errata/RHSA-2020:5023", "https://access.redhat.com/errata/RHSA-2020:4289", "https://access.redhat.com/errata/RHSA-2020:4286", "https://alas.aws.amazon.com/cve/html/CVE-2020-14331.html", "https://linux.oracle.com/cve/CVE-2020-14331.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-14331" ], "details": "A flaw was found in the Linux kernel\u2019s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "id": "GSD-2020-14331", "modified": "2023-12-13T01:22:00.424104Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-14331", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Linux Kernel", "version": { "version_data": [ { "version_affected": "=", "version_value": "All versions of the Linux kernel" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in the Linux kernel\u2019s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-787", "lang": "eng", "value": "CWE-787" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.openwall.com/lists/oss-security/2020/07/28/2", "refsource": "MISC", "url": "https://www.openwall.com/lists/oss-security/2020/07/28/2" }, { "name": "https://lists.openwall.net/linux-kernel/2020/07/29/234", "refsource": "MISC", "url": "https://lists.openwall.net/linux-kernel/2020/07/29/234" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1858679", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858679" }, { "name": "https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html", "refsource": "MISC", "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html" }, { "name": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html", "refsource": "MISC", "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html" }, { "name": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html", "refsource": "MISC", "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.7.19", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-14331" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A flaw was found in the Linux kernel\u2019s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-787" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1858679", "refsource": "MISC", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858679" }, { "name": "https://lists.openwall.net/linux-kernel/2020/07/29/234", "refsource": "MISC", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://lists.openwall.net/linux-kernel/2020/07/29/234" }, { "name": "https://www.openwall.com/lists/oss-security/2020/07/28/2", "refsource": "MISC", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2020/07/28/2" }, { "name": "[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html" }, { "name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html" }, { "name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.7, "impactScore": 5.9 } }, "lastModifiedDate": "2023-02-12T23:40Z", "publishedDate": "2020-09-15T19:15Z" } } }
fkie_cve-2020-14331
Vulnerability from fkie_nvd
Published
2020-09-15 19:15
Modified
2024-11-21 05:03
Severity ?
Summary
A flaw was found in the Linux kernel’s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1858679 | Issue Tracking, Third Party Advisory | |
secalert@redhat.com | https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | https://lists.openwall.net/linux-kernel/2020/07/29/234 | Mailing List, Patch, Third Party Advisory | |
secalert@redhat.com | https://www.openwall.com/lists/oss-security/2020/07/28/2 | Exploit, Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1858679 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.openwall.net/linux-kernel/2020/07/29/234 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.openwall.com/lists/oss-security/2020/07/28/2 | Exploit, Mailing List, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | 5.8.0 | |
linux | linux_kernel | 5.8.0 | |
linux | linux_kernel | 5.8.0 | |
linux | linux_kernel | 5.8.0 | |
linux | linux_kernel | 5.8.0 | |
linux | linux_kernel | 5.8.0 | |
redhat | enterprise_linux | 7.0 | |
redhat | enterprise_linux | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "72E6465E-D745-4617-A1EC-B881A2A3BB6D", "versionEndIncluding": "5.7.19", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "937239B6-1959-4099-AA57-039A3A661BE8", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "36DDFE55-065B-4549-A2EF-4F3C3015C7E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "1A8D373F-782F-41EC-AAC9-BB62BE3FDC00", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "5595D162-7A55-4223-9A78-7AAEFDA5B8D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "49E44009-A5C4-411E-B457-3634AFC4049C", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.8.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "8C34E334-530F-47D2-BEB4-1FAAB75B4401", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in the Linux kernel\u2019s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability." }, { "lang": "es", "value": "Se encontr\u00f3 un fallo en la implementaci\u00f3n del kernel de Linux del c\u00f3digo de video invertido en consolas VGA cuando un atacante local intenta cambiar el tama\u00f1o de la consola, llamando un ioctl VT_RESIZE, lo que causa una escritura fuera de l\u00edmites.\u0026#xa0;Este fallo permite a un usuario local con acceso a la consola VGA bloquear el sistema, escalando potencialmente sus privilegios en el sistema.\u0026#xa0;La mayor amenaza de esta vulnerabilidad es la confidencialidad e integridad de los datos, as\u00ed como la disponibilidad del sistema" } ], "id": "CVE-2020-14331", "lastModified": "2024-11-21T05:03:01.643", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.7, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-15T19:15:12.667", "references": [ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858679" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://lists.openwall.net/linux-kernel/2020/07/29/234" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2020/07/28/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858679" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://lists.openwall.net/linux-kernel/2020/07/29/234" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2020/07/28/2" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "secalert@redhat.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…