suse-su-2020:0599-1
Vulnerability from csaf_suse
Published
2020-03-05 15:16
Modified
2020-03-05 15:16
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP4 real-time kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-14615: An information disclosure vulnerability existed due to insufficient control flow in certain data structures for some Intel(R) Processors (bnc#1160195).
- CVE-2019-14895: A heap-based buffer overflow was discovered in the Marvell WiFi driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service or possibly execute arbitrary code (bnc#1157158).
- CVE-2019-14896: A heap overflow was found in the add_ie_rates() function of the Marvell Wifi Driver (bsc#1157157).
- CVE-2019-14897: A stack overflow was found in the lbs_ibss_join_existing() function of the Marvell Wifi Driver (bsc#1157155).
- CVE-2019-14901: A heap overflow flaw was found in the Marvell WiFi driver. The vulnerability allowed a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code (bnc#1157042).
- CVE-2019-15213: A use-after-free bug caused by a malicious USB device was found in drivers/media/usb/dvb-usb/dvb-usb-init.c (bsc#1146544).
- CVE-2019-16994: A memory leak existed in sit_init_net() in net/ipv6/sit.c which might have caused denial of service, aka CID-07f12b26e21a (bnc#1161523).
- CVE-2019-18660: An information disclosure bug occured because the Spectre-RSB mitigation were not in place for all applicable CPUs, aka CID-39e72bf96f58 (bnc#1157038).
- CVE-2019-18683: Multiple race conditions were discovered in drivers/media/platform/vivid. It was exploitable for privilege escalation if local users had access to /dev/video0, but only if the driver happened to be loaded. At least one of these race conditions led to a use-after-free (bnc#1155897).
- CVE-2019-18808: A memory leak in drivers/crypto/ccp/ccp-ops.c allowed attackers to cause a denial of service (memory consumption), aka CID-128c66429247 (bnc#1156259).
- CVE-2019-18809: A memory leak in drivers/media/usb/dvb-usb/af9005.c allowed attackers to cause a denial of service (memory consumption), aka CID-2289adbfa559 (bnc#1156258).
- CVE-2019-19036: An issue discovered in btrfs_root_node in fs/btrfs/ctree.c allowed a NULL pointer dereference because rcu_dereference(root->node) can be zero (bnc#1157692).
- CVE-2019-19045: A memory leak in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c allowed attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7 (bnc#1161522).
- CVE-2019-19051: A memory leak in drivers/net/wimax/i2400m/op-rfkill.c allowed attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7 (bnc#1159024).
- CVE-2019-19052: A memory leak in drivers/net/can/usb/gs_usb.c allowed attackers to cause a denial of service (memory consumption), aka CID-fb5be6a7b486 (bnc#1157324).
- CVE-2019-19054: A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c allowed attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b (bnc#1161518).
- CVE-2019-19056: A memory leak in drivers/net/wireless/marvell/mwifiex/pcie.c allowed attackers to cause a denial of service (memory consumption), aka CID-db8fd2cde932 (bnc#1157197).
- CVE-2019-19057: Two memory leaks in drivers/net/wireless/marvell/mwifiex/pcie.c allowed attackers to cause a denial of service (memory consumption), aka CID-d10dcb615c8e (bnc#1157193 bsc#1157197).
- CVE-2019-19058: A memory leak in drivers/net/wireless/intel/iwlwifi/fw/dbg.c allowed attackers to cause a denial of service (memory consumption), aka CID-b4b814fec1a5 (bnc#1157145).
- CVE-2019-19060: A memory leak in drivers/iio/imu/adis_buffer.c allowed attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41 (bnc#1157178).
- CVE-2019-19062: A memory leak in crypto/crypto_user_base.c allowed attackers to cause a denial of service (memory consumption), aka CID-ffdde5932042 (bnc#1157333).
- CVE-2019-19063: Two memory leaks in drivers/net/wireless/realtek/rtlwifi/usb.c allowed attackers to cause a denial of service (memory consumption), aka CID-3f9361695113 (bnc#1157298).
- CVE-2019-19065: A memory leak in drivers/infiniband/hw/hfi1/sdma.c allowed attackers to cause a denial of service (memory consumption), aka CID-34b3be18a04e (bnc#1157191).
- CVE-2019-19066: A memory leak in drivers/scsi/bfa/bfad_attr.c allowed attackers to cause a denial of service (memory consumption), aka CID-0e62395da2bd (bnc#1157303).
- CVE-2019-19067: There were four unlikely memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c (bnc#1157180).
- CVE-2019-19068: A memory leak in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allowed attackers to cause a denial of service (memory consumption), aka CID-a2cdd07488e6 (bnc#1157307).
- CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c allowed attackers to cause a denial of service (memory consumption), aka CID-853acf7caf10 (bnc#1157070).
- CVE-2019-19074: A memory leak in drivers/net/wireless/ath/ath9k/wmi.c allowed attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4 (bnc#1157143).
- CVE-2019-19075: A memory leak in drivers/net/ieee802154/ca8210.c allowed attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e (bnc#1157162).
- CVE-2019-19077: A memory leak in drivers/infiniband/hw/bnxt_re/ib_verbs.c allowed attackers to cause a denial of service (memory consumption), aka CID-4a9d46a9fe14 (bnc#1157171).
- CVE-2019-19227: In the AppleTalk subsystem there was a potential NULL pointer dereference because register_snap_client may return NULL. This could have led to denial of service, aka CID-9804501fa122 (bnc#1157678).
- CVE-2019-19318: Mounting a crafted btrfs image twice could have caused a use-after-free (bnc#1158026).
- CVE-2019-19319: A slab-out-of-bounds write access could have occured when setxattr was called after mounting of a specially crafted ext4 image (bnc#1158021).
- CVE-2019-19332: An out-of-bounds memory write issue was found in the way the KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could have used this flaw to crash the system (bnc#1158827).
- CVE-2019-19447: Mounting a crafted ext4 filesystem image, performing some operations, and unmounting could have led to a use-after-free in fs/ext4/super.c (bnc#1158819).
- CVE-2019-19523: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79 (bsc#1158823).
- CVE-2019-19524: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9 (bsc#1158413).
- CVE-2019-19525: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035 (bsc#1158417).
- CVE-2019-19526: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098 (bsc#1158893).
- CVE-2019-19527: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e (bsc#1158900).
- CVE-2019-19528: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d (bsc#1158407).
- CVE-2019-19529: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver, aka CID-4d6636498c41 (bnc#1158381).
- CVE-2019-19530: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef (bsc#1158410).
- CVE-2019-19531: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca (bsc#1158445).
- CVE-2019-19532: There were multiple out-of-bounds write bugs that can be caused by a malicious USB HID device, aka CID-d9d4b1e46d95 (bsc#1158824).
- CVE-2019-19533: There was an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464 (bsc#1158834).
- CVE-2019-19534: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29 (bsc#1158398).
- CVE-2019-19535: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042 (bsc#1158903).
- CVE-2019-19536: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0 (bsc#1158394).
- CVE-2019-19537: There was a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9 (bsc#1158904).
- CVE-2019-19543: There was a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c (bnc#1158427).
- CVE-2019-19767: There were multiple use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163 (bnc#1159297).
- CVE-2019-19965: There was a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5 (bnc#1159911).
- CVE-2019-19966: There was a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that could have caused a denial of service, aka CID-dea37a972655 (bnc#1159841).
- CVE-2019-20054: There was a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e (bnc#1159910).
- CVE-2019-20095: Several memory leaks were found in drivers/net/wireless/marvell/mwifiex/cfg80211.c, aka CID-003b686ace82 (bnc#1159909).
- CVE-2019-20096: There was a memory leak in __feat_register_sp() in net/dccp/feat.c, aka CID-1d3ff0950e2b (bnc#1159908).
- CVE-2020-7053: There was a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c (bnc#1160966).
- CVE-2019-19338: There was an incomplete fix for an issue with Transactional Synchronisation Extensions in the KVM code (bsc#1158954).
- CVE-2019-19049: There was an unlikely memory leak in unittest_data_add (bsc#1157173).
The following non-security bugs were fixed:
- ACPI / APEI: Do not wait to serialise with oops messages when panic()ing (bsc#1051510).
- ACPI / LPSS: Exclude I2C busses shared with PUNIT from pmc_atom_d3_mask (bsc#1051510).
- ACPI / LPSS: Ignore acpi_device_fix_up_power() return value (bsc#1051510).
- ACPI / SBS: Fix rare oops when removing modules (bsc#1051510).
- ACPI: bus: Fix NULL pointer check in acpi_bus_get_private_data() (bsc#1051510).
- ACPI: fix acpi_find_child_device() invocation in acpi_preset_companion() (bsc#1051510).
- ACPI: OSL: only free map once in osl.c (bsc#1051510).
- ACPI: sysfs: Change ACPI_MASKABLE_GPE_MAX to 0x100 (bsc#1051510).
- ACPICA: Never run _REG on system_memory and system_IO (bsc#1051510).
- ACPICA: Use %d for signed int print formatting instead of %u (bsc#1051510).
- af_packet: set defaule value for tmo (bsc#1051510).
- ALSA: 6fire: Drop the dead code (git-fixes).
- ALSA: control: remove useless assignment in .info callback of PCM chmap element (git-fixes).
- ALSA: cs4236: fix error return comparison of an unsigned integer (git-fixes).
- ALSA: echoaudio: simplify get_audio_levels (bsc#1051510).
- ALSA: fireface: fix return value in error path of isochronous resources reservation (bsc#1051510).
- ALSA: firewire-motu: Correct a typo in the clock proc string (git-fixes).
- ALSA: hda - Add docking station support for Lenovo Thinkpad T420s (git-fixes).
- ALSA: hda - Add mute led support for HP ProBook 645 G4 (git-fixes).
- ALSA: hda - Downgrade error message for single-cmd fallback (git-fixes).
- ALSA: hda - Fix pending unsol events at shutdown (git-fixes).
- ALSA: hda/analog - Minor optimization for SPDIF mux connections (git-fixes).
- ALSA: hda/ca0132 - Avoid endless loop (git-fixes).
- ALSA: hda/ca0132 - Fix work handling in delayed HP detection (git-fixes).
- ALSA: hda/ca0132 - Keep power on during processing DSP response (git-fixes).
- ALSA: hda/hdmi - Add new pci ids for AMD GPU display audio (git-fixes).
- ALSA: hda/hdmi - add retry logic to parse_intel_hdmi() (git-fixes).
- ALSA: hda/hdmi - fix atpx_present when CLASS is not VGA (bsc#1051510).
- ALSA: hda/hdmi - Fix duplicate unref of pci_dev (bsc#1051510).
- ALSA: hda/hdmi - fix vgaswitcheroo detection for AMD (git-fixes).
- ALSA: hda/realtek - Add headset Mic no shutup for ALC283 (bsc#1051510).
- ALSA: hda/realtek - Dell headphone has noise on unmute for ALC236 (git-fixes).
- ALSA: hda/realtek - Line-out jack does not work on a Dell AIO (bsc#1051510).
- ALSA: hda/realtek - Move some alc236 pintbls to fallback table (git-fixes).
- ALSA: hda/realtek - Move some alc256 pintbls to fallback table (git-fixes).
- ALSA: hda: Add Clevo W65_67SB the power_save blacklist (git-fixes).
- ALSA: i2c/cs8427: Fix int to char conversion (bsc#1051510).
- ALSA: ice1724: Fix sleep-in-atomic in Infrasonic Quartet support code (bsc#1051510).
- ALSA: intel8x0m: Register irq handler after register initializations (bsc#1051510).
- ALSA: oxfw: fix return value in error path of isochronous resources reservation (bsc#1051510).
- ALSA: pcm: Avoid possible info leaks from PCM stream buffers (git-fixes).
- ALSA: pcm: oss: Avoid potential buffer overflows (git-fixes).
- ALSA: pcm: signedness bug in snd_pcm_plug_alloc() (bsc#1051510).
- ALSA: seq: Do error checks at creating system ports (bsc#1051510).
- ALSA: seq: Fix racy access for queue timer in proc read (bsc#1051510).
- ALSA: sh: Fix compile warning wrt const (git-fixes).
- ALSA: usb-audio: Fix Focusrite Scarlett 6i6 gen1 - input handling (git-fixes).
- ALSA: usb-audio: fix set_format altsetting sanity check (bsc#1051510).
- ALSA: usb-audio: fix sync-ep altsetting sanity check (bsc#1051510).
- apparmor: fix unsigned len comparison with less than zero (git-fixes).
- appledisplay: fix error handling in the scheduled work (git-fixes).
- ar5523: check NULL before memcpy() in ar5523_cmd() (bsc#1051510).
- ASoC: au8540: use 64-bit arithmetic instead of 32-bit (bsc#1051510).
- ASoC: compress: fix unsigned integer overflow check (bsc#1051510).
- ASoC: cs4349: Use PM ops 'cs4349_runtime_pm' (bsc#1051510).
- ASoC: davinci-mcasp: Handle return value of devm_kasprintf (stable 4.14.y).
- ASoC: davinci: Kill BUG_ON() usage (stable 4.14.y).
- ASoC: dpcm: Properly initialise hw->rate_max (bsc#1051510).
- ASoC: Intel: hdac_hdmi: Limit sampling rates at dai creation (bsc#1051510).
- ASoC: Jack: Fix NULL pointer dereference in snd_soc_jack_report (bsc#1051510).
- ASoC: kirkwood: fix external clock probe defer (git-fixes).
- ASoC: msm8916-wcd-analog: Fix RX1 selection in RDAC2 MUX (git-fixes).
- ASoC: msm8916-wcd-analog: Fix selected events for MIC BIAS External1 (bsc#1051510).
- ASoC: sgtl5000: avoid division by zero if lo_vag is zero (bsc#1051510).
- ASoC: tegra_sgtl5000: fix device_node refcounting (bsc#1051510).
- ASoC: tlv320aic31xx: Handle inverted BCLK in non-DSP modes (stable 4.14.y).
- ASoC: tlv320dac31xx: mark expected switch fall-through (stable 4.14.y).
- ASoC: wm8962: fix lambda value (git-fixes).
- ata: ep93xx: Use proper enums for directions (bsc#1051510).
- ath10k: fix fw crash by moving chip reset after napi disabled (bsc#1051510).
- ath10k: fix kernel panic by moving pci flush after napi_disable (bsc#1051510).
- ath10k: fix vdev-start timeout on error (bsc#1051510).
- ath10k: limit available channels via DT ieee80211-freq-limit (bsc#1051510).
- ath10k: wmi: disable softirq's while calling ieee80211_rx (bsc#1051510).
- ath6kl: Fix off by one error in scan completion (bsc#1051510).
- ath9k: add back support for using active monitor interfaces for tx99 (bsc#1051510).
- ath9k: Fix a locking bug in ath9k_add_interface() (bsc#1051510).
- ath9k: fix reporting calculated new FFT upper max (bsc#1051510).
- ath9k: fix storage endpoint lookup (git-fixes).
- ath9k: fix tx99 with monitor mode interface (bsc#1051510).
- ath9k_hw: fix uninitialized variable data (bsc#1051510).
- atl1e: checking the status of atl1e_write_phy_reg (bsc#1051510).
- audit: Allow auditd to set pid to 0 to end auditing (bsc#1158094).
- ax88172a: fix information leak on short answers (bsc#1051510).
- backlight: lm3639: Unconditionally call led_classdev_unregister (bsc#1051510).
- batman-adv: Fix DAT candidate selection on little endian systems (bsc#1051510).
- bcma: remove set but not used variable 'sizel' (git-fixes).
- Bluetooth: btusb: fix PM leak in error case of setup (bsc#1051510).
- Bluetooth: delete a stray unlock (bsc#1051510).
- Bluetooth: Fix invalid-free in bcsp_close() (git-fixes).
- Bluetooth: Fix memory leak in hci_connect_le_scan (bsc#1051510).
- Bluetooth: hci_bcm: Handle specific unknown packets after firmware loading (bsc#1051510).
- Bluetooth: hci_core: fix init for HCI_USER_CHANNEL (bsc#1051510).
- Bluetooth: L2CAP: Detect if remote is not able to use the whole MPS (bsc#1051510).
- bonding: fix active-backup transition after link failure (git-fixes).
- bonding: fix slave stuck in BOND_LINK_FAIL state (networking-stable-19_11_10).
- bonding: fix state transition issue in link monitoring (networking-stable-19_11_10).
- bpf: Make use of probe_user_write in probe write helper (bsc#1083647).
- brcmfmac: fix full timeout waiting for action frame on-channel tx (bsc#1051510).
- brcmfmac: fix interface sanity check (git-fixes).
- brcmfmac: Fix memory leak in brcmf_usbdev_qinit (git-fixes).
- brcmfmac: Fix use after free in brcmf_sdio_readframes() (git-fixes).
- brcmfmac: reduce timeout for action frame scan (bsc#1051510).
- brcmsmac: AP mode: update beacon when TIM changes (bsc#1051510).
- brcmsmac: never log 'tid x is not agg'able' by default (bsc#1051510).
- btrfs: abort transaction after failed inode updates in create_subvol (bsc#1161936).
- btrfs: add missing extents release on file extent cluster relocation error (bsc#1159483).
- btrfs: avoid fallback to transaction commit during fsync of files with holes (bsc#1159569).
- btrfs: dev-replace: remove warning for unknown return codes when finished (dependency for bsc#1162067).
- btrfs: do not call synchronize_srcu() in inode_tree_del (bsc#1161934).
- btrfs: Ensure we trim ranges across block group boundary (bsc#1151910).
- btrfs: fix block group remaining RO forever after error during device replace (bsc#1160442).
- btrfs: fix infinite loop during nocow writeback due to race (bsc#1160804).
- btrfs: fix integer overflow in calc_reclaim_items_nr (bsc#1160433).
- btrfs: fix missing data checksums after replaying a log tree (bsc#1161931).
- btrfs: fix negative subv_writers counter and data space leak after buffered write (bsc#1160802).
- btrfs: fix removal logic of the tree mod log that leads to use-after-free issues (bsc#1160803).
- btrfs: fix selftests failure due to uninitialized i_mode in test inodes (Fix for dependency of bsc#1157692).
- btrfs: handle ENOENT in btrfs_uuid_tree_iterate (bsc#1161937).
- btrfs: harden agaist duplicate fsid on scanned devices (bsc#1134973).
- btrfs: inode: Verify inode mode to avoid NULL pointer dereference (dependency for bsc#1157692).
- btrfs: make tree checker detect checksum items with overlapping ranges (bsc#1161931).
- btrfs: Move btrfs_check_chunk_valid() to tree-check.[ch] and export it (dependency for bsc#1157692).
- btrfs: record all roots for rename exchange on a subvol (bsc#1161933).
- btrfs: relocation: fix reloc_root lifespan and access (bsc#1159588).
- btrfs: scrub: Require mandatory block group RO for dev-replace (bsc#1162067).
- btrfs: simplify inode locking for RWF_NOWAIT (git-fixes).
- btrfs: skip log replay on orphaned roots (bsc#1161935).
- btrfs: tree-checker: Check chunk item at tree block read time (dependency for bsc#1157692).
- btrfs: tree-checker: Check level for leaves and nodes (dependency for bsc#1157692).
- btrfs: tree-checker: Enhance chunk checker to validate chunk profile (dependency for bsc#1157692).
- btrfs: tree-checker: Fix wrong check on max devid (fixes for dependency of bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in block_group_err (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_block_group_item (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_csum_item (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_dev_item (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_dir_item (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_extent_data_item (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_inode_item (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_leaf (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in check_leaf_item (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in chunk_err (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in dev_item_err (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in dir_item_err (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in file_extent_err (dependency for bsc#1157692).
- btrfs: tree-checker: get fs_info from eb in generic_err (dependency for bsc#1157692).
- btrfs: tree-checker: Make btrfs_check_chunk_valid() return EUCLEAN instead of EIO (dependency for bsc#1157692).
- btrfs: tree-checker: Make chunk item checker messages more readable (dependency for bsc#1157692).
- btrfs: tree-checker: Verify dev item (dependency for bsc#1157692).
- btrfs: tree-checker: Verify inode item (dependency for bsc#1157692).
- btrfs: volumes: Use more straightforward way to calculate map length (bsc#1151910).
- can, slip: Protect tty->disc_data in write_wakeup and close with RCU (bsc#1051510).
- can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs (bsc#1051510).
- can: c_can: c_can_poll(): only read status register after status IRQ (git-fixes).
- can: c_can: D_CAN: c_can_chip_config(): perform a sofware reset on open (bsc#1051510).
- can: gs_usb: gs_usb_probe(): use descriptors of current altsetting (bsc#1051510).
- can: mcba_usb: fix use-after-free on disconnect (git-fixes).
- can: mscan: mscan_rx_poll(): fix rx path lockup when returning from polling to irq mode (bsc#1051510).
- can: peak_usb: fix a potential out-of-sync while decoding packets (git-fixes).
- can: peak_usb: fix slab info leak (git-fixes).
- can: peak_usb: report bus recovery as well (bsc#1051510).
- can: rx-offload: can_rx_offload_irq_offload_fifo(): continue on error (bsc#1051510).
- can: rx-offload: can_rx_offload_irq_offload_timestamp(): continue on error (bsc#1051510).
- can: rx-offload: can_rx_offload_offload_one(): do not increase the skb_queue beyond skb_queue_len_max (git-fixes).
- can: rx-offload: can_rx_offload_offload_one(): increment rx_fifo_errors on queue overflow or OOM (bsc#1051510).
- can: rx-offload: can_rx_offload_offload_one(): use ERR_PTR() to propagate error value in case of errors (bsc#1051510).
- can: rx-offload: can_rx_offload_queue_sorted(): fix error handling, avoid skb mem leak (git-fixes).
- can: rx-offload: can_rx_offload_queue_tail(): fix error handling, avoid skb mem leak (git-fixes).
- can: slcan: Fix use-after-free Read in slcan_open (bsc#1051510).
- can: usb_8dev: fix use-after-free on disconnect (git-fixes).
- CDC-NCM: handle incomplete transfer of MTU (networking-stable-19_11_10).
- ceph: add missing check in d_revalidate snapdir handling (bsc#1157183).
- ceph: do not try to handle hashed dentries in non-O_CREAT atomic_open (bsc#1157184).
- ceph: fix use-after-free in __ceph_remove_cap() (bsc#1154058).
- ceph: just skip unrecognized info in ceph_reply_info_extra (bsc#1157182).
- cfg80211/mac80211: make ieee80211_send_layer2_update a public function (bsc#1051510).
- cfg80211: Avoid regulatory restore when COUNTRY_IE_IGNORE is set (bsc#1051510).
- cfg80211: call disconnect_wk when AP stops (bsc#1051510).
- cfg80211: check for set_wiphy_params (bsc#1051510).
- cfg80211: fix page refcount issue in A-MSDU decap (bsc#1051510).
- cfg80211: Prevent regulatory restore during STA disconnect in concurrent interfaces (bsc#1051510).
- cgroup,writeback: do not switch wbs immediately on dead wbs if the memcg is dead (bsc#1158645).
- cgroup: pids: use atomic64_t for pids->limit (bsc#1161514).
- cifs: add a helper to find an existing readable handle to a file (bsc#1144333, bsc#1154355).
- cifs: add support for flock (bsc#1144333).
- cifs: avoid using MID 0xFFFF (bsc#1144333, bsc#1154355).
- cifs: Close cached root handle only if it had a lease (bsc#1144333).
- cifs: Close open handle after interrupted close (bsc#1144333).
- cifs: close the shared root handle on tree disconnect (bsc#1144333).
- cifs: create a helper to find a writeable handle by path name (bsc#1144333, bsc#1154355).
- cifs: Do not miss cancelled OPEN responses (bsc#1144333).
- cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bsc#1144333, bsc#1154355).
- cifs: Fix lookup of root ses in DFS referral cache (bsc#1144333).
- cifs: fix max ea value size (bsc#1144333, bsc#1154355).
- cifs: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1144333).
- cifs: Fix missed free operations (bsc#1144333, bsc#1154355).
- cifs: Fix mount options set in automount (bsc#1144333).
- cifs: Fix NULL pointer dereference in mid callback (bsc#1144333).
- cifs: Fix NULL-pointer dereference in smb2_push_mandatory_locks (bsc#1144333).
- cifs: Fix oplock handling for SMB 2.1+ protocols (bsc#1144333, bsc#1154355).
- cifs: Fix potential softlockups while refreshing DFS cache (bsc#1144333).
- cifs: Fix retrieval of DFS referrals in cifs_mount() (bsc#1144333).
- cifs: Fix retry mid list corruption on reconnects (bsc#1144333, bsc#1154355).
- cifs: Fix SMB2 oplock break processing (bsc#1144333, bsc#1154355).
- cifs: Fix use after free of file info structures (bsc#1144333, bsc#1154355).
- cifs: Fix use-after-free bug in cifs_reconnect() (bsc#1144333).
- cifs: Force reval dentry if LOOKUP_REVAL flag is set (bsc#1144333, bsc#1154355).
- cifs: Force revalidate inode when dentry is stale (bsc#1144333, bsc#1154355).
- cifs: Gracefully handle QueryInfo errors during open (bsc#1144333, bsc#1154355).
- cifs: move cifsFileInfo_put logic into a work-queue (bsc#1144333, bsc#1154355).
- cifs: prepare SMB2_Flush to be usable in compounds (bsc#1144333, bsc#1154355).
- cifs: Properly process SMB3 lease breaks (bsc#1144333).
- cifs: remove set but not used variables 'cinode' and 'netfid' (bsc#1144333).
- cifs: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1144333).
- cifs: set domainName when a domain-key is used in multiuser (bsc#1144333, bsc#1154355).
- cifs: use cifsInodeInfo->open_file_lock while iterating to avoid a panic (bsc#1144333, bsc#1154355).
- cifs: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#1144333, bsc#1154355).
- cifs: Use kzfree() to zero out the password (bsc#1144333, bsc#1154355).
- clk: at91: avoid sleeping early (git-fixes).
- clk: Do not try to enable critical clocks if prepare failed (bsc#1051510).
- clk: pxa: fix one of the pxa RTC clocks (bsc#1051510).
- clk: rockchip: fix I2S1 clock gate register for rk3328 (bsc#1051510).
- clk: rockchip: fix ID of 8ch clock of I2S1 for rk3328 (bsc#1051510).
- clk: rockchip: fix rk3188 sclk_mac_lbtest parameter ordering (bsc#1051510).
- clk: rockchip: fix rk3188 sclk_smc gate data (bsc#1051510).
- clk: samsung: exynos5420: Preserve CPU clocks configuration during suspend/resume (bsc#1051510).
- clk: samsung: exynos5420: Preserve PLL configuration during suspend/resume (git-fixes).
- clk: samsung: Use clk_hw API for calling clk framework from clk notifiers (bsc#1051510).
- clk: sunxi-ng: a80: fix the zero'ing of bits 16 and 18 (git-fixes).
- clk: sunxi: sun9i-mmc: Implement reset callback for reset controls (bsc#1051510).
- clocksource/drivers/sh_cmt: Fix clocksource width for 32-bit machines (bsc#1051510).
- clocksource/drivers/sh_cmt: Fixup for 64-bit machines (bsc#1051510).
- compat_ioctl: handle SIOCOUTQNSD (bsc#1051510).
- component: fix loop condition to call unbind() if bind() fails (bsc#1051510).
- configfs_register_group() shouldn't be (and isn't) called in rmdirable parts (bsc#1051510).
- copy/pasted 'Recommends:' instead of 'Provides:', 'Obsoletes:' and 'Conflicts:
- Cover up kABI breakage due to DH key verification (bsc#1155331).
- cpufreq/pasemi: fix use-after-free in pas_cpufreq_cpu_init() (bsc#1051510).
- cpufreq: intel_pstate: Register when ACPI PCCH is present (bsc#1051510).
- cpufreq: powernv: fix stack bloat and hard limit on number of CPUs (bsc#1051510).
- cpufreq: Skip cpufreq resume if it's not suspended (bsc#1051510).
- cpufreq: ti-cpufreq: add missing of_node_put() (bsc#1051510).
- cpupower : Fix cpupower working when cpu0 is offline (bsc#1051510).
- cpupower : frequency-set -r option misses the last cpu in related cpu list (bsc#1051510).
- cpupower: Fix coredump on VMWare (bsc#1051510).
- crypto: af_alg - cast ki_complete ternary op to int (bsc#1051510).
- crypto: af_alg - Use bh_lock_sock in sk_destruct (bsc#1051510).
- crypto: api - Check spawn->alg under lock in crypto_drop_spawn (bsc#1051510).
- crypto: atmel-sha - fix error handling when setting hmac key (bsc#1051510).
- crypto: ccp - fix uninitialized list head (bsc#1051510).
- crypto: chelsio - fix writing tfm flags to wrong place (bsc#1051510).
- crypto: crypto4xx - fix double-free in crypto4xx_destroy_sdr (bsc#1051510).
- crypto: dh - add public key verification test (bsc#1155331).
- crypto: dh - fix calculating encoded key size (bsc#1155331).
- crypto: dh - fix memory leak (bsc#1155331).
- crypto: dh - update test for public key verification (bsc#1155331).
- crypto: DRBG - add FIPS 140-2 CTRNG for noise source (bsc#1155334).
- crypto: ecdh - add public key verification test (bsc#1155331).
- crypto: ecdh - fix big endian bug in ECC library (bsc#1051510).
- crypto: ecdh - fix typo of P-192 b value (bsc#1155331).
- crypto: fix a memory leak in rsa-kcs1pad's encryption mode (bsc#1051510).
- crypto: geode-aes - switch to skcipher for cbc(aes) fallback (bsc#1051510).
- crypto: mxc-scc - fix build warnings on ARM64 (bsc#1051510).
- crypto: mxs-dcp - Fix AES issues (bsc#1051510).
- crypto: mxs-dcp - Fix SHA null hashes and output length (bsc#1051510).
- crypto: mxs-dcp - make symbols 'sha1_null_hash' and 'sha256_null_hash' static (bsc#1051510).
- crypto: pcrypt - Do not clear MAY_SLEEP flag in original request (bsc#1051510).
- crypto: picoxcell - adjust the position of tasklet_init and fix missed tasklet_kill (bsc#1051510).
- crypto: s5p-sss: Fix Fix argument list alignment (bsc#1051510).
- crypto: tgr192 - remove unneeded semicolon (bsc#1051510).
- cw1200: Fix a signedness bug in cw1200_load_firmware() (bsc#1051510).
- cxgb4: fix panic when attaching to ULD fail (networking-stable-19_11_05).
- cxgb4: request the TX CIDX updates to status page (bsc#1127371).
- dccp: do not leak jiffies on the wire (networking-stable-19_11_05).
- dlm: do not leak kernel pointer to userspace (bsc#1051510).
- dlm: fix invalid free (bsc#1051510).
- dma-buf: Fix memory leak in sync_file_merge() (git-fixes).
- dma-mapping: fix return type of dma_set_max_seg_size() (bsc#1051510).
- dmaengine: coh901318: Fix a double-lock bug (bsc#1051510).
- dmaengine: coh901318: Remove unused variable (bsc#1051510).
- dmaengine: dma-jz4780: Do not depend on MACH_JZ4780 (bsc#1051510).
- dmaengine: dma-jz4780: Further residue status fix (bsc#1051510).
- dmaengine: ep93xx: Return proper enum in ep93xx_dma_chan_direction (bsc#1051510).
- dmaengine: Fix access to uninitialized dma_slave_caps (bsc#1051510).
- dmaengine: imx-sdma: fix use-after-free on probe error path (bsc#1051510).
- dmaengine: rcar-dmac: set scatter/gather max segment size (bsc#1051510).
- dmaengine: timb_dma: Use proper enum in td_prep_slave_sg (bsc#1051510).
- docs: move protection-keys.rst to the core-api book (bsc#1078248).
- Documentation: debugfs: Document debugfs helper for unsigned long values (git-fixes).
- Documentation: x86: convert protection-keys.txt to reST (bsc#1078248).
- drivers/base/memory.c: cache blocks in radix tree to accelerate lookup (bsc#1159955 ltc#182993).
- drivers/base/platform.c: kmemleak ignore a known leak (bsc#1051510).
- drivers/regulator: fix a missing check of return value (bsc#1051510).
- drm/amdgpu: fix bad DMA from INTERRUPT_CNTL2 (bsc#1114279)
- drm/dp_mst: correct the shifting in DP_REMOTE_I2C_READ (bsc#1051510).
- drm/etnaviv: fix dumping of iommuv2 (bsc#1113722)
- drm/fb-helper: Round up bits_per_pixel if possible (bsc#1051510).
- drm/i810: Prevent underflow in ioctl (bsc#1114279)
- drm/i915: Add missing include file <linux/math64.h> (bsc#1051510).
- drm/i915: Fix pid leak with banned clients (bsc#1114279)
- drm/mst: Fix MST sideband up-reply failure handling (bsc#1051510).
- drm/omap: fix max fclk divider for omap36xx (bsc#1113722)
- drm/qxl: Return error if fbdev is not 32 bpp (bsc#1159028)
- drm/radeon: fix bad DMA from INTERRUPT_CNTL2 (git-fixes).
- drm/radeon: fix r1xx/r2xx register checker for POT textures (bsc#1114279)
- drm/radeon: fix si_enable_smc_cac() failed issue (bsc#1113722)
- drm/rockchip: Round up _before_ giving to the clock framework (bsc#1114279)
- drm: limit to INT_MAX in create_blob ioctl (bsc#1051510).
- drm: meson: venc: cvbs: fix CVBS mode matching (bsc#1051510).
- drm: panel-lvds: Potential Oops in probe error handling (bsc#1114279)
- e1000e: Add support for Comet Lake (bsc#1158533).
- e1000e: Add support for Tiger Lake (bsc#1158533).
- e1000e: Drop unnecessary __E1000_DOWN bit twiddling (bsc#1158049).
- e1000e: Increase pause and refresh time (bsc#1158533).
- e1000e: Use dev_get_drvdata where possible (bsc#1158049).
- e1000e: Use rtnl_lock to prevent race conditions between net and pci/pm (bsc#1158049).
- e100: Fix passing zero to 'PTR_ERR' warning in e100_load_ucode_wait (bsc#1051510).
- ecryptfs_lookup_interpose(): lower_dentry->d_inode is not stable (bsc#1158646).
- ecryptfs_lookup_interpose(): lower_dentry->d_parent is not stable either (bsc#1158647).
- EDAC/ghes: Fix locking and memory barrier issues (bsc#1114279). EDAC/ghes: Do not warn when incrementing refcount on 0 (bsc#1114279).
- EDAC/ghes: Fix Use after free in ghes_edac remove path (bsc#1114279).
- exit: panic before exit_mm() on global init exit (bsc#1161549).
- ext4: fix punch hole for inline_data file systems (bsc#1158640).
- ext4: update direct I/O read lock pattern for IOCB_NOWAIT (bsc#1158639).
- extcon: cht-wc: Return from default case to avoid warnings (bsc#1051510).
- extcon: max8997: Fix lack of path setting in USB device mode (bsc#1051510).
- fbdev: sbuslib: integer overflow in sbusfb_ioctl_helper() (bsc#1051510).
- fbdev: sbuslib: use checked version of put_user() (bsc#1051510).
- fjes: fix missed check in fjes_acpi_add (bsc#1051510).
- fs: cifs: Fix atime update check vs mtime (bsc#1144333).
- ftrace: Avoid potential division by zero in function profiler (bsc#1160784).
- ftrace: Introduce PERMANENT ftrace_ops flag (bsc#1120853).
- genirq: Prevent NULL pointer dereference in resend_irqs() (bsc#1051510).
- genirq: Properly pair kobject_del() with kobject_add() (bsc#1051510).
- gpio: Fix error message on out-of-range GPIO in lookup table (bsc#1051510).
- gpio: mpc8xxx: Do not overwrite default irq_set_type callback (bsc#1051510).
- gpio: syscon: Fix possible NULL ptr usage (bsc#1051510).
- gpiolib: acpi: Add Terra Pad 1061 to the run_edge_events_on_boot_blacklist (bsc#1051510).
- gsmi: Fix bug in append_to_eventlog sysfs handler (bsc#1051510).
- HID: Add ASUS T100CHI keyboard dock battery quirks (bsc#1051510).
- HID: Add quirk for Microsoft PIXART OEM mouse (bsc#1051510).
- HID: asus: Add T100CHI bluetooth keyboard dock special keys mapping (bsc#1051510).
- HID: doc: fix wrong data structure reference for UHID_OUTPUT (bsc#1051510).
- HID: Fix assumption that devices have inputs (git-fixes).
- HID: hidraw, uhid: Always report EPOLLOUT (bsc#1051510).
- HID: hidraw: Fix returning EPOLLOUT from hidraw_poll (bsc#1051510).
- HID: intel-ish-hid: fixes incorrect error handling (bsc#1051510).
- HID: uhid: Fix returning EPOLLOUT from uhid_char_poll (bsc#1051510).
- HID: wacom: generic: Treat serial number and related fields as unsigned (git-fixes).
- hidraw: Return EPOLLOUT from hidraw_poll (bsc#1051510).
- hwmon: (ina3221) Fix INA3221_CONFIG_MODE macros (bsc#1051510).
- hwmon: (pwm-fan) Silence error on probe deferral (bsc#1051510).
- hwrng: omap - Fix RNG wait loop timeout (bsc#1051510).
- hwrng: omap3-rom - Call clk_disable_unprepare() on exit only if not idled (bsc#1051510).
- hwrng: stm32 - fix unbalanced pm_runtime_enable (bsc#1051510).
- hypfs: Fix error number left in struct pointer member (bsc#1051510).
- i2c: imx: do not print error message on probe defer (bsc#1051510).
- ibmveth: Detect unsupported packets before sending to the hypervisor (bsc#1159484 ltc#182983).
- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).
- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).
- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).
- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).
- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).
- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).
- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).
- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).
- idr: Fix idr_alloc_u32 on 32-bit systems (bsc#1051510).
- iio: adc: max9611: explicitly cast gain_selectors (bsc#1051510).
- iio: adc: max9611: Fix too short conversion time delay (bsc#1051510).
- iio: adc: stm32-adc: fix stopping dma (git-fixes).
- iio: buffer: align the size of scan bytes to size of the largest element (bsc#1051510).
- iio: dac: mcp4922: fix error handling in mcp4922_write_raw (bsc#1051510).
- iio: imu: adis16480: assign bias value only if operation succeeded (git-fixes).
- iio: imu: adis16480: make sure provided frequency is positive (git-fixes).
- iio: imu: adis: assign read val in debugfs hook only if op successful (git-fixes).
- iio: imu: adis: assign value only if return code zero in read funcs (git-fixes).
- include/linux/bitrev.h: fix constant bitrev (bsc#1114279).
- inet: protect against too small mtu values (networking-stable-19_12_16).
- inet: stop leaking jiffies on the wire (networking-stable-19_11_05).
- init: add arch_call_rest_init to allow stack switching (jsc#SLE-11179).
- Input: aiptek - fix endpoint sanity check (bsc#1051510).
- Input: cyttsp4_core - fix use after free bug (bsc#1051510).
- Input: ff-memless - kill timer in destroy() (bsc#1051510).
- Input: goodix - add upside-down quirk for Teclast X89 tablet (bsc#1051510).
- Input: gtco - fix endpoint sanity check (bsc#1051510).
- Input: keyspan-remote - fix control-message timeouts (bsc#1051510).
- Input: pegasus_notetaker - fix endpoint sanity check (bsc#1051510).
- Input: pm8xxx-vib - fix handling of separate enable register (bsc#1051510).
- Input: rmi_f54 - read from FIFO in 32 byte blocks (bsc#1051510).
- Input: silead - try firmware reload after unsuccessful resume (bsc#1051510).
- Input: st1232 - set INPUT_PROP_DIRECT property (bsc#1051510).
- Input: sun4i-ts - add a check for devm_thermal_zone_of_sensor_register (bsc#1051510).
- Input: sur40 - fix interface sanity checks (bsc#1051510).
- Input: synaptics - switch another X1 Carbon 6 to RMI/SMbus (bsc#1051510).
- Input: synaptics-rmi4 - clear IRQ enables for F54 (bsc#1051510).
- Input: synaptics-rmi4 - destroy F54 poller workqueue when removing (bsc#1051510).
- Input: synaptics-rmi4 - disable the relative position IRQ in the F12 driver (bsc#1051510).
- Input: synaptics-rmi4 - do not consume more data than we have (F11, F12) (bsc#1051510).
- Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers (bsc#1051510).
- Input: synaptics-rmi4 - fix video buffer size (git-fixes).
- Input: synaptics-rmi4 - simplify data read in rmi_f54_work (bsc#1051510).
- intel_th: Fix a double put_device() in error path (git-fixes).
- iomap: Fix pipe page leakage during splicing (bsc#1158651).
- iommu/vt-d: Fix QI_DEV_IOTLB_PFSID and QI_DEV_EIOTLB_PFSID macros (bsc#1158063).
- iommu/vt-d: Unlink device if failed to add to group (bsc#1160756).
- iommu: Remove device link to group on failure (bsc#1160755).
- ipmi:dmi: Ignore IPMI SMBIOS entries with a zero base address (bsc#1051510).
- ipv4: Fix table id reference in fib_sync_down_addr (networking-stable-19_11_10).
- ipv4: Return -ENETUNREACH if we can't create route but saddr is valid (networking-stable-19_10_24).
- iwlegacy: ensure loop counter addr does not wrap and cause an infinite loop (git-fixes).
- iwlwifi: api: annotate compressed BA notif array sizes (bsc#1051510).
- iwlwifi: check kasprintf() return value (bsc#1051510).
- iwlwifi: mvm: avoid sending too many BARs (bsc#1051510).
- iwlwifi: mvm: do not send keys when entering D3 (bsc#1051510).
- iwlwifi: mvm: Send non offchannel traffic via AP sta (bsc#1051510).
- iwlwifi: mvm: synchronize TID queue removal (bsc#1051510).
- kABI workaround for ath10k last_wmi_vdev_start_status field (bsc#1051510).
- kABI workaround for can/skb.h inclusion (bsc#1051510).
- kABI workaround for struct mwifiex_power_cfg change (bsc#1051510).
- kABI: add _q suffix to exports that take struct dh (bsc#1155331).
- kABI: Fix for 'KVM: x86: Introduce vcpu->arch.xsaves_enabled' (bsc#1158066).
- kABI: protect struct sctp_ep_common (kabi).
- kernel/trace: Fix do not unregister tracepoints when register sched_migrate_task fail (bsc#1160787).
- kernfs: Fix range checks in kernfs_get_target_path (bsc#1051510).
- kexec: bail out upon SIGKILL when allocating memory (git-fixes).
- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl (git-fixes).
- KVM: s390: Test for bad access register and size at the start of S390_MEM_OP (git-fixes).
- KVM: SVM: Guard against DEACTIVATE when performing WBINVD/DF_FLUSH (bsc#1114279).
- KVM: SVM: Serialize access to the SEV ASID bitmap (bsc#1114279).
- KVM: VMX: Consider PID.PIR to determine if vCPU has pending interrupts (bsc#1158064).
- KVM: VMX: Fix conditions for guest IA32_XSS support (bsc#1158065).
- KVM: x86/mmu: Take slots_lock when using kvm_mmu_zap_all_fast() (bsc#1158067).
- KVM: x86: Host feature SSBD does not imply guest feature SPEC_CTRL_SSBD (bsc#1160476).
- KVM: x86: Introduce vcpu->arch.xsaves_enabled (bsc#1158066).
- KVM: x86: Remove a spurious export of a static function (bsc#1158954).
- leds: Allow to call led_classdev_unregister() unconditionally (bsc#1161674).
- leds: class: ensure workqueue is initialized before setting brightness (bsc#1161674).
- liquidio: fix race condition in instruction completion processing (bsc#1051510).
- livepatch: Allow to distinguish different version of system state changes (bsc#1071995).
- livepatch: Basic API to track system state changes (bsc#1071995 ).
- livepatch: Keep replaced patches until post_patch callback is called (bsc#1071995).
- livepatch: Selftests of the API for tracking system state changes (bsc#1071995).
- livepatch: Simplify stack trace retrieval (jsc#SLE-11179).
- loop: add ioctl for changing logical block size (bsc#1108043).
- loop: fix no-unmap write-zeroes request behavior (bsc#1158637).
- mac80211: consider QoS Null frames for STA_NULLFUNC_ACKED (bsc#1051510).
- mac80211: Do not send Layer 2 Update frame before authorization (bsc#1051510).
- mac80211: fix station inactive_time shortly after boot (bsc#1051510).
- mac80211: minstrel: fix CCK rate group streams value (bsc#1051510).
- mac80211: minstrel: fix sampling/reporting of CCK rates in HT mode (bsc#1051510).
- macvlan: do not assume mac_header is set in macvlan_broadcast() (bsc#1051510).
- macvlan: schedule bc_work even if error (bsc#1051510).
- macvlan: use skb_reset_mac_header() in macvlan_queue_xmit() (bsc#1051510).
- mailbox: mailbox-test: fix null pointer if no mmio (bsc#1051510).
- mailbox: reset txdone_method TXDONE_BY_POLL if client knows_txdone (git-fixes).
- media: au0828: Fix incorrect error messages (bsc#1051510).
- media: bdisp: fix memleak on release (git-fixes).
- media: cec.h: CEC_OP_REC_FLAG_ values were swapped (bsc#1051510).
- media: cec: report Vendor ID after initialization (bsc#1051510).
- media: cxusb: detect cxusb_ctrl_msg error in query (bsc#1051510).
- media: davinci: Fix implicit enum conversion warning (bsc#1051510).
- media: exynos4-is: Fix recursive locking in isp_video_release() (git-fixes).
- media: fix: media: pci: meye: validate offset to avoid arbitrary access (bsc#1051510).
- media: flexcop-usb: ensure -EIO is returned on error condition (git-fixes).
- media: imon: invalid dereference in imon_touch_event (bsc#1051510).
- media: isif: fix a NULL pointer dereference bug (bsc#1051510).
- media: ov6650: Fix control handler not freed on init error (git-fixes).
- media: pci: ivtv: Fix a sleep-in-atomic-context bug in ivtv_yuv_init() (bsc#1051510).
- media: pulse8-cec: return 0 when invalidating the logical address (bsc#1051510).
- media: pxa_camera: Fix check for pdev->dev.of_node (bsc#1051510).
- media: radio: wl1273: fix interrupt masking on release (git-fixes).
- media: stkwebcam: Bugfix for wrong return values (bsc#1051510).
- media: ti-vpe: vpe: Fix Motion Vector vpdma stride (git-fixes).
- media: usbvision: Fix races among open, close, and disconnect (bsc#1051510).
- media: uvcvideo: Fix error path in control parsing failure (git-fixes).
- media: v4l2-ctrl: fix flags for DO_WHITE_BALANCE (bsc#1051510).
- media: vim2m: Fix abort issue (git-fixes).
- media: vivid: Set vid_cap_streaming and vid_out_streaming to true (bsc#1051510).
- mei: bus: prefix device names on bus with the bus name (bsc#1051510).
- mei: fix modalias documentation (git-fixes).
- mei: samples: fix a signedness bug in amt_host_if_call() (bsc#1051510).
- mfd: intel-lpss: Add default I2C device properties for Gemini Lake (bsc#1051510).
- mfd: max8997: Enale irq-wakeup unconditionally (bsc#1051510).
- mfd: mc13xxx-core: Fix PMIC shutdown when reading ADC values (bsc#1051510).
- mfd: palmas: Assign the right powerhold mask for tps65917 (git-fixes).
- mfd: ti_am335x_tscadc: Keep ADC interface on if child is wakeup capable (bsc#1051510).
- mISDN: Fix type of switch control variable in ctrl_teimanager (bsc#1051510).
- missing escaping of backslashes in macro expansions Fixes: f3b74b0ae86b ('rpm/kernel-subpackage-spec: Unify dependency handling.') Fixes: 3fd22e219f77 ('rpm/kernel-subpackage-spec: Fix empty Recommends tag (bsc#1143959)')
- mlx5: add parameter to disable enhanced IPoIB (bsc#1142095)
- mm, memory_hotplug: do not clear numa_node association after hot_remove (bnc#1115026).
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d() (git fixes (mm/gup)).
- mm/compaction.c: clear total_{migrate,free}_scanned before scanning a new zone (git fixes (mm/compaction)).
- mm/debug.c: PageAnon() is true for PageKsm() pages (git fixes (mm/debug)).
- mm/page-writeback.c: fix range_cyclic writeback vs writepages deadlock (bsc#1159394).
- mm: memory_hotplug: use put_device() if device_register fail (bsc#1159955 ltc#182993).
- mmc: core: fix wl1251 sdio quirks (git-fixes).
- mmc: host: omap_hsmmc: add code for special init of wl1251 to get rid of pandora_wl1251_init_card (git-fixes).
- mmc: mediatek: fix cannot receive new request when msdc_cmd_is_ready fail (bsc#1051510).
- mmc: mediatek: fix CMD_TA to 2 for MT8173 HS200/HS400 mode (bsc#1051510).
- mmc: sdhci-of-at91: fix quirk2 overwrite (git-fixes).
- mmc: sdhci-of-esdhc: fix P2020 errata handling (bsc#1051510).
- mmc: sdhci-of-esdhc: Revert 'mmc: sdhci-of-esdhc: add erratum A-009204 support' (bsc#1051510).
- mmc: sdhci: fix minimum clock rate for v3 controller (bsc#1051510).
- mmc: sdio: fix wl1251 vendor id (git-fixes).
- mmc: tegra: fix SDR50 tuning override (bsc#1051510).
- moduleparam: fix parameter description mismatch (bsc#1051510).
- mt7601u: fix bbp version check in mt7601u_wait_bbp_ready (bsc#1051510).
- mtd: spear_smi: Fix Write Burst mode (bsc#1051510).
- mtd: spi-nor: fix silent truncation in spi_nor_read() (bsc#1051510).
- mwifiex: debugfs: correct histogram spacing, formatting (bsc#1051510).
- mwifiex: drop most magic numbers from mwifiex_process_tdls_action_frame() (git-fixes).
- mwifiex: Fix NL80211_TX_POWER_LIMITED (bsc#1051510).
- mwifiex: fix potential NULL dereference and use after free (bsc#1051510).
- nbd: prevent memory leak (bsc#1158638).
- net/ibmvnic: Fix typo in retry check (bsc#1155689 ltc#182047).
- net/ibmvnic: Ignore H_FUNCTION return from H_EOI to tolerate XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).
- net/mlx4_core: Dynamically set guaranteed amount of counters per VF (networking-stable-19_11_05).
- net/mlx4_en: fix mlx4 ethtool -N insertion (networking-stable-19_11_25).
- net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq (bsc#1046303).
- net/mlx5e: Fix handling of compressed CQEs in case of low NAPI budget (networking-stable-19_11_05).
- net/mlx5e: Fix set vf link state error flow (networking-stable-19_11_25).
- net/mlx5e: Fix SFF 8472 eeprom length (git-fixes).
- net/mlxfw: Fix out-of-memory error in mfa2 flash burning (bsc#1051858).
- net/sched: act_pedit: fix WARN() in the traffic path (networking-stable-19_11_25).
- net/smc: avoid fallback in case of non-blocking connect (git-fixes).
- net/smc: fix closing of fallback SMC sockets (git-fixes).
- net/smc: Fix error path in smc_init (git-fixes).
- net/smc: fix ethernet interface refcounting (git-fixes).
- net/smc: fix refcounting for non-blocking connect() (git-fixes).
- net/smc: keep vlan_id for SMC-R in smc_listen_work() (git-fixes).
- net: add READ_ONCE() annotation in __skb_wait_for_more_packets() (networking-stable-19_11_05).
- net: add skb_queue_empty_lockless() (networking-stable-19_11_05).
- net: annotate accesses to sk->sk_incoming_cpu (networking-stable-19_11_05).
- net: annotate lockless accesses to sk->sk_napi_id (networking-stable-19_11_05).
- net: avoid potential infinite loop in tc_ctl_action() (networking-stable-19_10_24).
- net: bcmgenet: Fix RGMII_MODE_EN value for GENET v1/2/3 (networking-stable-19_10_24).
- net: bcmgenet: reset 40nm EPHY on energy detect (networking-stable-19_11_05).
- net: bcmgenet: Set phydev->dev_flags only for internal PHYs (networking-stable-19_10_24).
- net: bridge: deny dev_set_mac_address() when unregistering (networking-stable-19_12_16).
- net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size() (git-fixes).
- net: dsa: b53: Do not clear existing mirrored port mask (networking-stable-19_11_05).
- net: dsa: bcm_sf2: Fix IMP setup for port different than 8 (networking-stable-19_11_05).
- net: dsa: fix switch tree list (networking-stable-19_11_05).
- net: ethernet: ftgmac100: Fix DMA coherency issue with SW checksum (networking-stable-19_11_05).
- net: ethernet: octeon_mgmt: Account for second possible VLAN header (networking-stable-19_11_10).
- net: ethernet: ti: cpsw: fix extra rx interrupt (networking-stable-19_12_16).
- net: fix data-race in neigh_event_send() (networking-stable-19_11_10).
- net: fix sk_page_frag() recursion from memory reclaim (networking-stable-19_11_05).
- net: hisilicon: Fix ping latency when deal with high throughput (networking-stable-19_11_05).
- net: phy: at803x: Change error to EINVAL for invalid MAC (bsc#1051510).
- net: phy: broadcom: Use strlcpy() for ethtool::get_strings (bsc#1051510).
- net: phy: Check against net_device being NULL (bsc#1051510).
- net: phy: dp83867: Set up RGMII TX delay (bsc#1051510).
- net: phy: Fix not to call phy_resume() if PHY is not attached (bsc#1051510).
- net: phy: Fix the register offsets in Broadcom iProc mdio mux driver (bsc#1051510).
- net: phy: fixed_phy: Fix fixed_phy not checking GPIO (bsc#1051510).
- net: phy: marvell: clear wol event before setting it (bsc#1051510).
- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1051510).
- net: phy: meson-gxl: check phy_write return value (bsc#1051510).
- net: phy: micrel: Use strlcpy() for ethtool::get_strings (bsc#1051510).
- net: phy: mscc: read 'vsc8531, edge-slowdown' as an u32 (bsc#1051510).
- net: phy: mscc: read 'vsc8531,vddmac' as an u32 (bsc#1051510).
- net: phy: xgene: disable clk on error paths (bsc#1051510).
- net: phy: xgmiitorgmii: Check phy_driver ready before accessing (bsc#1051510).
- net: phy: xgmiitorgmii: Check read_status results (bsc#1051510).
- net: phy: xgmiitorgmii: Support generic PHY status read (bsc#1051510).
- net: psample: fix skb_over_panic (networking-stable-19_12_03).
- net: rtnetlink: prevent underflows in do_setvfinfo() (networking-stable-19_11_25).
- net: sched: fix `tc -s class show` no bstats on class with nolock subqueues (networking-stable-19_12_03).
- net: stmmac: disable/enable ptp_ref_clk in suspend/resume flow (networking-stable-19_10_24).
- net: usb: lan78xx: limit size of local TSO packets (bsc#1051510).
- net: usb: qmi_wwan: add support for DW5821e with eSIM support (networking-stable-19_11_10).
- net: usb: qmi_wwan: add support for Foxconn T77W968 LTE modules (networking-stable-19_11_18).
- net: use skb_queue_empty_lockless() in busy poll contexts (networking-stable-19_11_05).
- net: use skb_queue_empty_lockless() in poll() handlers (networking-stable-19_11_05).
- net: wireless: ti: remove local VENDOR_ID and DEVICE_ID definitions (git-fixes).
- net: wireless: ti: wl1251 use new SDIO_VENDOR_ID_TI_WL1251 definition (git-fixes).
- net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol() (networking-stable-19_11_05).
- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).
- netns: fix GFP flags in rtnl_net_notifyid() (networking-stable-19_11_05).
- nfc: fdp: fix incorrect free object (networking-stable-19_11_10).
- nfc: netlink: fix double device reference drop (git-fixes).
- nfc: nxp-nci: Fix NULL pointer dereference after I2C communication error (git-fixes).
- nfc: pn533: fix bulk-message timeout (bsc#1051510).
- nfc: pn544: Adjust indentation in pn544_hci_check_presence (git-fixes).
- nfc: port100: handle command failure cleanly (git-fixes).
- nfc: st21nfca: fix double free (networking-stable-19_11_10).
- nl80211: Fix a GET_KEY reply attribute (bsc#1051510).
- ocfs2: fix panic due to ocfs2_wq is null (bsc#1158644).
- ocfs2: fix passing zero to 'PTR_ERR' warning (bsc#1158649).
- openvswitch: drop unneeded BUG_ON() in ovs_flow_cmd_build_info() (networking-stable-19_12_03).
- openvswitch: fix flow command message size (git-fixes).
- openvswitch: remove another BUG_ON() (networking-stable-19_12_03).
- openvswitch: support asymmetric conntrack (networking-stable-19_12_16).
- orinoco_usb: fix interface sanity check (git-fixes).
- padata: use smp_mb in padata_reorder to avoid orphaned padata jobs (git-fixes).
- PCI/ACPI: Correct error message for ASPM disabling (bsc#1051510).
- PCI/MSI: Fix incorrect MSI-X masking on resume (bsc#1051510).
- PCI/MSI: Return -ENOSPC from pci_alloc_irq_vectors_affinity() (bsc#1051510).
- PCI/PME: Fix possible use-after-free on remove (git-fixes).
- PCI/PTM: Remove spurious 'd' from granularity message (bsc#1051510).
- PCI: Apply Cavium ACS quirk to ThunderX2 and ThunderX3 (bsc#1051510).
- PCI: dwc: Fix find_next_bit() usage (bsc#1051510).
- PCI: Fix Intel ACS quirk UPDCR register address (bsc#1051510).
- PCI: rcar: Fix missing MACCTLR register setting in initialization sequence (bsc#1051510).
- PCI: sysfs: Ignore lockdep for remove attribute (git-fixes).
- PCI: tegra: Enable Relaxed Ordering only for Tegra20 & Tegra30 (git-fixes).
- phy: phy-twl4030-usb: fix denied runtime access (git-fixes).
- pinctl: ti: iodelay: fix error checking on pinctrl_count_index_with_args call (git-fixes).
- pinctrl: at91: do not use the same irqchip with multiple gpiochips (git-fixes).
- pinctrl: cherryview: Allocate IRQ chip dynamic (git-fixes).
- pinctrl: lewisburg: Update pin list according to v1.1v6 (bsc#1051510).
- pinctrl: lpc18xx: Use define directive for PIN_CONFIG_GPIO_PIN_INT (bsc#1051510).
- pinctrl: qcom: spmi-gpio: fix gpio-hog related boot issues (bsc#1051510).
- pinctrl: qcom: ssbi-gpio: fix gpio-hog related boot issues (bsc#1051510).
- pinctrl: samsung: Fix device node refcount leaks in init code (bsc#1051510).
- pinctrl: samsung: Fix device node refcount leaks in S3C24xx wakeup controller init (bsc#1051510).
- pinctrl: samsung: Fix device node refcount leaks in S3C64xx wakeup controller init (bsc#1051510).
- pinctrl: sunxi: Fix a memory leak in 'sunxi_pinctrl_build_state()' (bsc#1051510).
- pinctrl: xway: fix gpio-hog related boot issues (bsc#1051510).
- pinctrl: zynq: Use define directive for PIN_CONFIG_IO_STANDARD (bsc#1051510).
- pktcdvd: remove warning on attempting to register non-passthrough dev (bsc#1051510).
- platform/x86: asus-wmi: Fix keyboard brightness cannot be set to 0 (bsc#1051510).
- platform/x86: hp-wmi: Fix ACPI errors caused by passing 0 as input size (bsc#1051510).
- platform/x86: hp-wmi: Fix ACPI errors caused by too small buffer (bsc#1051510).
- platform/x86: hp-wmi: Make buffer for HPWMI_FEATURE2_QUERY 128 bytes (bsc#1051510).
- platform/x86: pmc_atom: Add Siemens CONNECT X300 to critclk_systems DMI table (bsc#1051510).
- PM / AVS: SmartReflex: NULL check before some freeing functions is not needed (bsc#1051510).
- PM / devfreq: Check NULL governor in available_governors_show (git-fixes).
- PM / devfreq: exynos-bus: Correct clock enable sequence (bsc#1051510).
- PM / devfreq: Lock devfreq in trans_stat_show (git-fixes).
- PM / devfreq: passive: fix compiler warning (bsc#1051510).
- PM / devfreq: passive: Use non-devm notifiers (bsc#1051510).
- PM / Domains: Deal with multiple states but no governor in genpd (bsc#1051510).
- PM / hibernate: Check the success of generating md5 digest before hibernation (bsc#1051510).
- power: reset: at91-poweroff: do not procede if at91_shdwc is allocated (bsc#1051510).
- power: supply: ab8500_fg: silence uninitialized variable warnings (bsc#1051510).
- power: supply: twl4030_charger: disable eoc interrupt on linear charge (bsc#1051510).
- power: supply: twl4030_charger: fix charging current out-of-bounds (bsc#1051510).
- powerpc/archrandom: fix arch_get_random_seed_int() (bsc#1065729).
- powerpc/book3s64/hash: Use secondary hash for bolted mapping if the primary is full (bsc#1157778 ltc#182520).
- powerpc/bpf: Fix tail call implementation (bsc#1157698).
- powerpc/irq: fix stack overflow verification (bsc#1065729).
- powerpc/livepatch: return -ERRNO values in save_stack_trace_tsk_reliable() (bsc#1071995 bsc#1161875).
- powerpc/mm: drop #ifdef CONFIG_MMU in is_ioremap_addr() (bsc#1065729).
- powerpc/pkeys: remove unused pkey_allows_readwrite (bsc#1065729).
- powerpc/powernv: Disable native PCIe port management (bsc#1065729).
- powerpc/pseries/lparcfg: Fix display of Maximum Memory (bsc#1162028 ltc#181740).
- powerpc/pseries/mobility: notify network peers after migration (bsc#1152631 ltc#181798).
- powerpc/pseries: Do not fail hash page table insert for bolted mapping (bsc#1157778 ltc#182520).
- powerpc/pseries: Do not opencode HPTE_V_BOLTED (bsc#1157778 ltc#182520).
- powerpc/pseries: Drop pointless static qualifier in vpa_debugfs_init() (git-fixes).
- powerpc/security: Fix debugfs data leak on 32-bit (bsc#1065729).
- powerpc/tools: Do not quote $objdump in scripts (bsc#1065729).
- powerpc/xive: Discard ESB load value when interrupt is invalid (bsc#1085030).
- powerpc/xive: Skip ioremap() of ESB pages for LSI interrupts (bsc#1085030).
- powerpc: Allow 64bit VDSO __kernel_sync_dicache to work across ranges >4GB (bnc#1151927 5.3.17).
- powerpc: Allow flush_icache_range to work across ranges >4GB (bnc#1151927 5.3.17).
- powerpc: Fix vDSO clock_getres() (bsc#1065729).
- ppdev: fix PPGETTIME/PPSETTIME ioctls (bsc#1051510).
- ppp: Adjust indentation into ppp_async_input (git-fixes).
- prevent active file list thrashing due to refault detection (VM Performance, bsc#1156286).
- printk: Export console_printk (bsc#1071995).
- pwm: bcm-iproc: Prevent unloading the driver module while in use (git-fixes).
- pwm: Clear chip_data in pwm_put() (bsc#1051510).
- pwm: clps711x: Fix period calculation (bsc#1051510).
- pwm: lpss: Only set update bit if we are actually changing the settings (bsc#1051510).
- qede: Disable hardware gro when xdp prog is installed (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qede: fix NULL pointer deref in __qede_remove() (networking-stable-19_11_10).
- r8152: add device id for Lenovo ThinkPad USB-C Dock Gen 2 (networking-stable-19_11_05).
- r8152: add missing endpoint sanity check (bsc#1051510).
- random: move FIPS continuous test to output functions (bsc#1155334).
- RDMA/bnxt_re: Avoid freeing MR resources if dereg fails (bsc#1050244).
- RDMA/hns: Prevent memory leaks of eq->buf_list (bsc#1104427 ).
- README.BRANCH: removing myself from the maintainer list
- regulator: ab8500: Remove AB8505 USB regulator (bsc#1051510).
- regulator: ab8500: Remove SYSCLKREQ from enum ab8505_regulator_id (bsc#1051510).
- regulator: rn5t618: fix module aliases (bsc#1051510).
- regulator: tps65910: fix a missing check of return value (bsc#1051510).
- remoteproc: Check for NULL firmwares in sysfs interface (git-fixes).
- reset: fix of_reset_simple_xlate kerneldoc comment (bsc#1051510).
- reset: Fix potential use-after-free in __of_reset_control_get() (bsc#1051510).
- reset: fix reset_control_get_exclusive kerneldoc comment (bsc#1051510).
- reset: fix reset_control_ops kerneldoc comment (bsc#1051510).
- resource: fix locking in find_next_iomem_res() (bsc#1114279).
- Revert 'ath10k: fix DMA related firmware crashes on multiple devices' (git-fixes).
- Revert 'Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers' (bsc#1051510).
- Revert 'mmc: sdhci: Fix incorrect switch to HS mode' (bsc#1051510).
- rpm/kernel-binary.spec.in: add COMPRESS_VMLINUX (bnc#1155921) Let COMPRESS_VMLINUX determine the compression used for vmlinux. By default (historically), it is gz.
- rpm/kernel-source.spec.in: Fix dependency of kernel-devel (bsc#1154043)
- rpm/kernel-subpackage-spec: Exclude kernel-firmware recommends (bsc#1143959) For reducing the dependency on kernel-firmware in sub packages
- rpm/kernel-subpackage-spec: Fix empty Recommends tag (bsc#1143959)
- rpm/kernel-subpackage-spec: fix kernel-default-base build There were some issues with recent changes to subpackage dependencies handling:
- rpm/kernel-subpackage-spec: Unify dependency handling.
- rpm/modules.fips: update module list (bsc#1157853)
- rsi_91x_usb: fix interface sanity check (git-fixes).
- rt2800: remove errornous duplicate condition (git-fixes).
- rtc: dt-binding: abx80x: fix resistance scale (bsc#1051510).
- rtc: max8997: Fix the returned value in case of error in 'max8997_rtc_read_alarm()' (bsc#1051510).
- rtc: msm6242: Fix reading of 10-hour digit (bsc#1051510).
- rtc: pcf8523: set xtal load capacitance from DT (bsc#1051510).
- rtc: s35390a: Change buf's type to u8 in s35390a_init (bsc#1051510).
- rtl8187: Fix warning generated when strncpy() destination length matches the sixe argument (bsc#1051510).
- rtl818x: fix potential use after free (bsc#1051510).
- rtl8xxxu: fix interface sanity check (git-fixes).
- rtlwifi: Remove unnecessary NULL check in rtl_regd_init (bsc#1051510).
- rtlwifi: rtl8192de: Fix misleading REG_MCUFWDL information (bsc#1051510).
- rtlwifi: rtl8192de: Fix missing code to retrieve RX buffer address (bsc#1051510).
- rtlwifi: rtl8192de: Fix missing enable interrupt flag (bsc#1051510).
- s390/bpf: fix lcgr instruction encoding (bsc#1051510).
- s390/bpf: use 32-bit index for tail calls (bsc#1051510).
- s390/cio: avoid calling strlen on null pointer (bsc#1051510).
- s390/cio: exclude subchannels with no parent from pseudo check (bsc#1051510).
- s390/cmm: fix information leak in cmm_timeout_handler() (bsc#1051510).
- s390/ftrace: generate traced function stack frame (jsc#SLE-11178 jsc#SLE-11179).
- s390/ftrace: save traced function caller (jsc#SLE-11179).
- s390/ftrace: use HAVE_FUNCTION_GRAPH_RET_ADDR_PTR (jsc#SLE-11179).
- s390/head64: correct init_task stack setup (jsc#SLE-11179).
- s390/idle: fix cpu idle time calculation (bsc#1051510).
- s390/kasan: avoid false positives during stack unwind (jsc#SLE-11179).
- s390/kasan: avoid report in get_wchan (jsc#SLE-11179).
- s390/livepatch: Implement reliable stack tracing for the consistency model (jsc#SLE-11179).
- s390/mm: properly clear _PAGE_NOEXEC bit when it is not supported (bsc#1051510).
- s390/process: avoid custom stack unwinding in get_wchan (jsc#SLE-11179).
- s390/process: avoid potential reading of freed stack (bsc#1051510).
- s390/qdio: (re-)initialize tiqdio list entries (bsc#1051510).
- s390/qdio: do not touch the dsci in tiqdio_add_input_queues() (bsc#1051510).
- s390/qeth: clean up page frag creation (git-fixes).
- s390/qeth: consolidate skb allocation (git-fixes).
- s390/qeth: ensure linear access to packet headers (git-fixes).
- s390/qeth: guard against runt packets (git-fixes).
- s390/qeth: return proper errno on IO error (bsc#1051510).
- s390/setup: fix boot crash for machine without EDAT-1 (bsc#1051510 bsc#1140948).
- s390/setup: fix early warning messages (bsc#1051510 bsc#1140948).
- s390/stacktrace: use common arch_stack_walk infrastructure (jsc#SLE-11179).
- s390/suspend: fix stack setup in swsusp_arch_suspend (jsc#SLE-11179).
- s390/test_unwind: print verbose unwinding results (jsc#SLE-11179).
- s390/topology: avoid firing events before kobjs are created (bsc#1051510).
- s390/unwind: add stack pointer alignment sanity checks (jsc#SLE-11179).
- s390/unwind: always inline get_stack_pointer (jsc#SLE-11179).
- s390/unwind: avoid int overflow in outside_of_stack (jsc#SLE-11179).
- s390/unwind: cleanup unused READ_ONCE_TASK_STACK (jsc#SLE-11179).
- s390/unwind: correct stack switching during unwind (jsc#SLE-11179).
- s390/unwind: drop unnecessary code around calling ftrace_graph_ret_addr() (jsc#SLE-11179).
- s390/unwind: filter out unreliable bogus %r14 (jsc#SLE-11179).
- s390/unwind: fix get_stack_pointer(NULL, NULL) (jsc#SLE-11179).
- s390/unwind: fix mixing regs and sp (jsc#SLE-11179).
- s390/unwind: introduce stack unwind API (jsc#SLE-11179).
- s390/unwind: make reuse_sp default when unwinding pt_regs (jsc#SLE-11179).
- s390/unwind: remove stack recursion warning (jsc#SLE-11179).
- s390/unwind: report an error if pt_regs are not on stack (jsc#SLE-11179).
- s390/unwind: start unwinding from reliable state (jsc#SLE-11179).
- s390/unwind: stop gracefully at task pt_regs (jsc#SLE-11179).
- s390/unwind: stop gracefully at user mode pt_regs in irq stack (jsc#SLE-11179).
- s390/unwind: unify task is current checks (jsc#SLE-11179).
- s390: add stack switch helper (jsc#SLE-11179).
- s390: add support for virtually mapped kernel stacks (jsc#SLE-11179).
- s390: always inline current_stack_pointer() (jsc#SLE-11179).
- s390: always inline disabled_wait (jsc#SLE-11179).
- s390: avoid misusing CALL_ON_STACK for task stack setup (jsc#SLE-11179).
- s390: clean up stacks setup (jsc#SLE-11179).
- s390: correct CALL_ON_STACK back_chain saving (jsc#SLE-11179).
- s390: disable preemption when switching to nodat stack with CALL_ON_STACK (jsc#SLE-11179).
- s390: fine-tune stack switch helper (jsc#SLE-11179).
- s390: fix register clobbering in CALL_ON_STACK (jsc#SLE-11179).
- s390: fix stfle zero padding (bsc#1051510).
- s390: kabi workaround for ftrace_ret_stack (jsc#SLE-11179).
- s390: kabi workaround for lowcore changes due to vmap stack (jsc#SLE-11179).
- s390: kabi workaround for reliable stack tracing (jsc#SLE-11179).
- s390: preserve kabi for stack unwind API (jsc#SLE-11179).
- s390: unify stack size definitions (jsc#SLE-11179).
- sched/fair: Add tmp_alone_branch assertion (bnc#1156462).
- sched/fair: Fix insertion in rq->leaf_cfs_rq_list (bnc#1156462).
- sched/fair: Fix O(nr_cgroups) in the load balancing path (bnc#1156462).
- sched/fair: Optimize update_blocked_averages() (bnc#1156462).
- sched/fair: WARN() and refuse to set buddy when !se->on_rq (bsc#1158132).
- scsi: lpfc: Fix Oops in nvme_register with target logout/login (bsc#1151900).
- scsi: qla2xxx: Add a shadow variable to hold disc_state history of fcport (bsc#1158013).
- scsi: qla2xxx: Add D-Port Diagnostic reason explanation logs (bsc#1158013).
- scsi: qla2xxx: Add debug dump of LOGO payload and ELS IOCB (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: Added support for MPI and PEP regions for ISP28XX (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).
- scsi: qla2xxx: Allow PLOGI in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: Change discovery state before PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: Cleanup unused async_logout_done (bsc#1158013).
- scsi: qla2xxx: Configure local loop for N2N target (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: Consolidate fabric scan (bsc#1158013).
- scsi: qla2xxx: Correct fcport flags handling (bsc#1158013).
- scsi: qla2xxx: Correctly retrieve and interpret active flash region (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).
- scsi: qla2xxx: Do not call qlt_async_event twice (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: Do not defer relogin unconditonally (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: Drop superfluous INIT_WORK of del_work (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: Fix fabric scan hang (bsc#1158013).
- scsi: qla2xxx: Fix incorrect SFUB length used for Secure Flash Update MB Cmd (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).
- scsi: qla2xxx: Fix mtcp dump collection failure (bsc#1158013).
- scsi: qla2xxx: Fix PLOGI payload and ELS IOCB dump length (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: Fix qla2x00_request_irqs() for MSI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: Fix RIDA Format-2 (bsc#1158013).
- scsi: qla2xxx: fix rports not being mark as lost in sync fabric scan (bsc#1138039).
- scsi: qla2xxx: Fix stuck login session using prli_pend_timer (bsc#1158013).
- scsi: qla2xxx: Fix stuck session in GNL (bsc#1158013).
- scsi: qla2xxx: Fix the endianness of the qla82xx_get_fw_size() return type (bsc#1158013).
- scsi: qla2xxx: Fix update_fcport for current_topology (bsc#1158013).
- scsi: qla2xxx: Ignore NULL pointer in tcm_qla2xxx_free_mcmd (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: Ignore PORT UPDATE after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: Improve readability of the code that handles qla_flt_header (bsc#1158013).
- scsi: qla2xxx: Initialize free_work before flushing it (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: Remove defer flag to indicate immeadiate port loss (bsc#1158013).
- scsi: qla2xxx: Send Notify ACK after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: unregister ports after GPN_FT failure (bsc#1138039).
- scsi: qla2xxx: Update driver version to 10.01.00.22-k (bsc#1158013).
- scsi: qla2xxx: Use common routine to free fcport struct (bsc#1158013).
- scsi: qla2xxx: Use explicit LOGO in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).
- scsi: qla2xxx: Use get_unaligned_*() instead of open-coding these functions (bsc#1158013).
- scsi: zfcp: fix request object use-after-free in send path causing wrong traces (bsc#1051510).
- scsi: zfcp: trace channel log even for FCP command responses (git-fixes).
- sctp: cache netns in sctp_ep_common (networking-stable-19_12_03).
- sctp: change sctp_prot .no_autobind with true (networking-stable-19_10_24).
- selftests: net: reuseport_dualstack: fix uninitalized parameter (networking-stable-19_11_05).
- serial: max310x: Fix tx_empty() callback (bsc#1051510).
- serial: mxs-auart: Fix potential infinite loop (bsc#1051510).
- serial: samsung: Enable baud clock for UART reset procedure in resume (bsc#1051510).
- serial: uartps: Fix suspend functionality (bsc#1051510).
- sfc: Only cancel the PPS workqueue if it exists (networking-stable-19_11_25).
- signal: Properly set TRACE_SIGNAL_LOSE_INFO in __send_signal (bsc#1157463).
- slcan: Fix memory leak in error path (bsc#1051510).
- slip: Fix memory leak in slip_open error path (bsc#1051510).
- slip: Fix use-after-free Read in slip_open (bsc#1051510).
- smb3: Fix crash in SMB2_open_init due to uninitialized field in compounding path (bsc#1144333).
- smb3: fix leak in 'open on server' perf counter (bsc#1144333, bsc#1154355).
- smb3: Fix persistent handles reconnect (bsc#1144333).
- smb3: fix refcount underflow warning on unmount when no directory leases (bsc#1144333).
- smb3: fix signing verification of large reads (bsc#1144333, bsc#1154355).
- smb3: fix unmount hang in open_shroot (bsc#1144333, bsc#1154355).
- smb3: improve handling of share deleted (and share recreated) (bsc#1144333, bsc#1154355).
- smb3: Incorrect size for netname negotiate context (bsc#1144333, bsc#1154355).
- smb3: remove confusing dmesg when mounting with encryption ('seal') (bsc#1144333).
- soc: imx: gpc: fix PDN delay (bsc#1051510).
- soc: qcom: wcnss_ctrl: Avoid string overflow (bsc#1051510).
- spi: atmel: Fix CS high support (bsc#1051510).
- spi: atmel: fix handling of cs_change set on non-last xfer (bsc#1051510).
- spi: fsl-lpspi: Prevent FIFO under/overrun by default (bsc#1051510).
- spi: mediatek: Do not modify spi_transfer when transfer (bsc#1051510).
- spi: mediatek: use correct mata->xfer_len when in fifo transfer (bsc#1051510).
- spi: omap2-mcspi: Fix DMA and FIFO event trigger size mismatch (bsc#1051510).
- spi: omap2-mcspi: Set FIFO DMA trigger level to word length (bsc#1051510).
- spi: pic32: Use proper enum in dmaengine_prep_slave_rg (bsc#1051510).
- spi: rockchip: initialize dma_slave_config properly (bsc#1051510).
- spi: spidev: Fix OF tree warning logic (bsc#1051510).
- stacktrace: Do not skip first entry on noncurrent tasks (jsc#SLE-11179).
- stacktrace: Force USER_DS for stack_trace_save_user() (jsc#SLE-11179).
- stacktrace: Get rid of unneeded '!!' pattern (jsc#SLE-11179).
- stacktrace: Provide common infrastructure (jsc#SLE-11179).
- stacktrace: Provide helpers for common stack trace operations (jsc#SLE-11179).
- stacktrace: Unbreak stack_trace_save_tsk_reliable() (jsc#SLE-11179).
- stacktrace: Use PF_KTHREAD to check for kernel threads (jsc#SLE-11179).
- staging: comedi: adv_pci1710: fix AI channels 16-31 for PCI-1713 (bsc#1051510).
- staging: iio: adt7316: Fix i2c data reading, set the data field (bsc#1051510).
- staging: rtl8188eu: fix interface sanity check (bsc#1051510).
- staging: rtl8192e: fix potential use after free (bsc#1051510).
- staging: rtl8723bs: Add 024c:0525 to the list of SDIO device-ids (bsc#1051510).
- staging: rtl8723bs: Drop ACPI device ids (bsc#1051510).
- stm class: Fix a double free of stm_source_device (bsc#1051510).
- supported.conf:
- synclink_gt(): fix compat_ioctl() (bsc#1051510).
- tcp: clear tp->packets_out when purging write queue (bsc#1160560).
- tcp: exit if nothing to retransmit on RTO timeout (bsc#1160560, stable 4.14.159).
- tcp: md5: fix potential overestimation of TCP option space (networking-stable-19_12_16).
- tcp_nv: fix potential integer overflow in tcpnv_acked (bsc#1051510).
- thermal: Fix deadlock in thermal thermal_zone_device_check (bsc#1051510).
- thunderbolt: Fix lockdep circular locking depedency warning (git-fixes).
- tipc: Avoid copying bytes beyond the supplied data (bsc#1051510).
- tipc: check bearer name with right length in tipc_nl_compat_bearer_enable (bsc#1051510).
- tipc: check link name with right length in tipc_nl_compat_link_set (bsc#1051510).
- tipc: check msg->req data len in tipc_nl_compat_bearer_disable (bsc#1051510).
- tipc: compat: allow tipc commands without arguments (bsc#1051510).
- tipc: fix a missing check of genlmsg_put (bsc#1051510).
- tipc: fix link name length check (bsc#1051510).
- tipc: fix memory leak in tipc_nl_compat_publ_dump (bsc#1051510).
- tipc: fix skb may be leaky in tipc_link_input (bsc#1051510).
- tipc: fix tipc_mon_delete() oops in tipc_enable_bearer() error path (bsc#1051510).
- tipc: fix wrong timeout input for tipc_wait_for_cond() (bsc#1051510).
- tipc: handle the err returned from cmd header function (bsc#1051510).
- tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb (bsc#1051510).
- tipc: tipc clang warning (bsc#1051510).
- tpm: add check after commands attribs tab allocation (bsc#1051510).
- tracing: Cleanup stack trace code (jsc#SLE-11179).
- tracing: Have the histogram compare functions convert to u64 first (bsc#1160210).
- tracing: xen: Ordered comparison of function pointers (git-fixes).
- tty: serial: fsl_lpuart: use the sg count from dma_map_sg (bsc#1051510).
- tty: serial: imx: use the sg count from dma_map_sg (bsc#1051510).
- tty: serial: msm_serial: Fix flow control (bsc#1051510).
- tty: serial: pch_uart: correct usage of dma_unmap_sg (bsc#1051510).
- uaccess: Add non-pagefault user-space write function (bsc#1083647).
- ubifs: Correctly initialize c->min_log_bytes (bsc#1158641).
- ubifs: Limit the number of pages in shrink_liability (bsc#1158643).
- udp: use skb_queue_empty_lockless() (networking-stable-19_11_05).
- usb-serial: cp201x: support Mark-10 digital force gauge (bsc#1051510).
- usb: adutux: fix interface sanity check (bsc#1051510).
- usb: Allow USB device to be warm reset in suspended state (bsc#1051510).
- usb: atm: ueagle-atm: add missing endpoint check (bsc#1051510).
- usb: chaoskey: fix error case of a timeout (git-fixes).
- usb: chipidea: Fix otg event handler (bsc#1051510).
- usb: chipidea: host: Disable port power only if previously enabled (bsc#1051510).
- usb: chipidea: imx: enable OTG overcurrent in case USB subsystem is already started (bsc#1051510).
- usb: core: hub: Improved device recognition on remote wakeup (bsc#1051510).
- usb: core: urb: fix URB structure initialization function (bsc#1051510).
- usb: documentation: flags on usb-storage versus UAS (bsc#1051510).
- usb: dwc3: debugfs: Properly print/set link state for HS (bsc#1051510).
- usb: dwc3: do not log probe deferrals; but do log other error codes (bsc#1051510).
- usb: dwc3: ep0: Clear started flag on completion (bsc#1051510).
- usb: dwc3: gadget: Check ENBLSLPM before sending ep command (bsc#1051510).
- usb: gadget: pch_udc: fix use after free (bsc#1051510).
- usb: gadget: udc: fotg210-udc: Fix a sleep-in-atomic-context bug in fotg210_get_status() (bsc#1051510).
- usb: gadget: uvc: configfs: Drop leaked references to config items (bsc#1051510).
- usb: gadget: uvc: configfs: Prevent format changes after linking header (bsc#1051510).
- usb: gadget: uvc: Factor out video USB request queueing (bsc#1051510).
- usb: gadget: uvc: Only halt video streaming endpoint in bulk mode (bsc#1051510).
- usb: gadget: u_serial: add missing port entry locking (bsc#1051510).
- usb: idmouse: fix interface sanity checks (bsc#1051510).
- usb: misc: appledisplay: fix backlight update_status return code (bsc#1051510).
- usb: mon: Fix a deadlock in usbmon between mmap and read (bsc#1051510).
- usb: mtu3: fix dbginfo in qmu_tx_zlp_error_handler (bsc#1051510).
- usb: musb: dma: Correct parameter passed to IRQ handler (bsc#1051510).
- usb: musb: fix idling for suspend after disconnect interrupt (bsc#1051510).
- usb: serial: ch341: handle unbound port at reset_resume (bsc#1051510).
- usb: serial: ftdi_sio: add device IDs for U-Blox C099-F9P (bsc#1051510).
- usb: serial: io_edgeport: add missing active-port sanity check (bsc#1051510).
- usb: serial: io_edgeport: fix epic endpoint lookup (bsc#1051510).
- usb: serial: io_edgeport: handle unbound ports on URB completion (bsc#1051510).
- usb: serial: io_edgeport: use irqsave() in USB's complete callback (bsc#1051510).
- usb: serial: keyspan: handle unbound ports (bsc#1051510).
- usb: serial: mos7720: fix remote wakeup (git-fixes).
- usb: serial: mos7840: add USB ID to support Moxa UPort 2210 (bsc#1051510).
- usb: serial: mos7840: fix remote wakeup (git-fixes).
- usb: serial: opticon: fix control-message timeouts (bsc#1051510).
- usb: serial: option: add support for DW5821e with eSIM support (bsc#1051510).
- usb: serial: option: add support for Foxconn T77W968 LTE modules (bsc#1051510).
- usb: serial: option: Add support for Quectel RM500Q (bsc#1051510).
- usb: serial: quatech2: handle unbound ports (bsc#1051510).
- usb: serial: simple: Add Motorola Solutions TETRA MTP3xxx and MTP85xx (bsc#1051510).
- usb: serial: suppress driver bind attributes (bsc#1051510).
- usb: uas: heed CAPACITY_HEURISTICS (bsc#1051510).
- usb: uas: honor flag to avoid CAPACITY16 (bsc#1051510).
- usb: xhci-mtk: fix ISOC error when interval is zero (bsc#1051510).
- usb: xhci: Fix build warning seen with CONFIG_PM=n (bsc#1051510).
- usb: xhci: only set D3hot for pci device (bsc#1051510).
- usbip: Fix receive error in vhci-hcd when using scatter-gather (bsc#1051510).
- usbip: tools: fix fd leakage in the function of read_attr_usbip_status (git-fixes).
- vfio-ccw: Fix misleading comment when setting orb.cmd.c64 (bsc#1051510).
- vfio-ccw: Set pa_nr to 0 if memory allocation fails for pa_iova_pfn (bsc#1051510).
- vfio: ccw: push down unsupported IDA check (bsc#1156471 LTC#182362).
- vfs: fix preadv64v2 and pwritev64v2 compat syscalls with offset == -1 (bsc#1051510).
- video/hdmi: Fix AVI bar unpack (git-fixes).
- video: backlight: Add devres versions of of_find_backlight (bsc#1090888) Taken for 6010831dde5.
- video: backlight: Add of_find_backlight helper in backlight.c (bsc#1090888) Taken for 6010831dde5.
- virtio/s390: fix race on airq_areas (bsc#1051510).
- virtio_console: allocate inbufs in add_port() only if it is needed (git-fixes).
- virtio_ring: fix return code on DMA mapping fails (git-fixes).
- vmxnet3: turn off lro when rxcsum is disabled (bsc#1157499).
- vsock/virtio: fix sock refcnt holding during the shutdown (git-fixes).
- watchdog: meson: Fix the wrong value of left time (bsc#1051510).
- watchdog: sama5d4: fix WDD value to be always set to max (bsc#1051510).
- workqueue: Fix pwq ref leak in rescuer_thread() (bsc#1160211).
- x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).
- x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).
- x86/kgbd: Use NMI_VECTOR not APIC_DM_NMI (bsc#1114279).
- x86/mce/AMD: Allow any CPU to initialize the smca_banks array (bsc#1114279).
- x86/MCE/AMD: Allow Reserved types to be overwritten in smca_banks (bsc#1114279).
- x86/MCE/AMD: Do not use rdmsr_safe_on_cpu() in smca_configure() (bsc#1114279).
- x86/mce: Fix possibly incorrect severity calculation on AMD (bsc#1114279).
- x86/mm/pkeys: Fix typo in Documentation/x86/protection-keys.txt (bsc#1078248).
- x86/pkeys: Update documentation about availability (bsc#1078248).
- x86/resctrl: Fix an imbalance in domain_remove_cpu() (bsc#1114279).
- x86/resctrl: Fix potential lockdep warning (bsc#1114279).
- x86/resctrl: Fix potential memory leak (bsc#1114279).
- x86/resctrl: Prevent NULL pointer dereference when reading mondata (bsc#1114279).
- x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs (bsc#1158068).
- x86/speculation: Fix incorrect MDS/TAA mitigation status (bsc#1114279).
- x86/speculation: Fix redundant MDS mitigation message (bsc#1114279).
- xen-blkfront: switch kcalloc to kvcalloc for large array allocation (bsc#1160917).
- xen/blkback: Avoid unmapping unmapped grant pages (bsc#1065600).
- xen/blkfront: Adjust indentation in xlvbd_alloc_gendisk (bsc#1065600).
- xfrm: Fix transport mode skb control buffer usage (bsc#1161552).
- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1161087, bsc#1153917).
- xfs: Sanity check flags of Q_XQUOTARM call (bsc#1158652).
- xhci: handle some XHCI_TRUST_TX_LENGTH quirks cases as default behaviour (bsc#1051510).
- xhci: Increase STS_HALT timeout in xhci_suspend() (bsc#1051510).
- zd1211rw: fix storage endpoint lookup (git-fixes).
Patchnames
SUSE-2020-599,SUSE-SLE-RT-12-SP4-2020-599
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP4 real-time kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2019-14615: An information disclosure vulnerability existed due to insufficient control flow in certain data structures for some Intel(R) Processors (bnc#1160195).\n- CVE-2019-14895: A heap-based buffer overflow was discovered in the Marvell WiFi driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service or possibly execute arbitrary code (bnc#1157158).\n- CVE-2019-14896: A heap overflow was found in the add_ie_rates() function of the Marvell Wifi Driver (bsc#1157157).\n- CVE-2019-14897: A stack overflow was found in the lbs_ibss_join_existing() function of the Marvell Wifi Driver (bsc#1157155).\n- CVE-2019-14901: A heap overflow flaw was found in the Marvell WiFi driver. The vulnerability allowed a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code (bnc#1157042).\n- CVE-2019-15213: A use-after-free bug caused by a malicious USB device was found in drivers/media/usb/dvb-usb/dvb-usb-init.c (bsc#1146544).\n- CVE-2019-16994: A memory leak existed in sit_init_net() in net/ipv6/sit.c which might have caused denial of service, aka CID-07f12b26e21a (bnc#1161523).\n- CVE-2019-18660: An information disclosure bug occured because the Spectre-RSB mitigation were not in place for all applicable CPUs, aka CID-39e72bf96f58 (bnc#1157038).\n- CVE-2019-18683: Multiple race conditions were discovered in drivers/media/platform/vivid. It was exploitable for privilege escalation if local users had access to /dev/video0, but only if the driver happened to be loaded. At least one of these race conditions led to a use-after-free (bnc#1155897).\n- CVE-2019-18808: A memory leak in drivers/crypto/ccp/ccp-ops.c allowed attackers to cause a denial of service (memory consumption), aka CID-128c66429247 (bnc#1156259).\n- CVE-2019-18809: A memory leak in drivers/media/usb/dvb-usb/af9005.c allowed attackers to cause a denial of service (memory consumption), aka CID-2289adbfa559 (bnc#1156258).\n- CVE-2019-19036: An issue discovered in btrfs_root_node in fs/btrfs/ctree.c allowed a NULL pointer dereference because rcu_dereference(root-\u003enode) can be zero (bnc#1157692).\n- CVE-2019-19045: A memory leak in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c allowed attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7 (bnc#1161522).\n- CVE-2019-19051: A memory leak in drivers/net/wimax/i2400m/op-rfkill.c allowed attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7 (bnc#1159024).\n- CVE-2019-19052: A memory leak in drivers/net/can/usb/gs_usb.c allowed attackers to cause a denial of service (memory consumption), aka CID-fb5be6a7b486 (bnc#1157324).\n- CVE-2019-19054: A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c allowed attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b (bnc#1161518).\n- CVE-2019-19056: A memory leak in drivers/net/wireless/marvell/mwifiex/pcie.c allowed attackers to cause a denial of service (memory consumption), aka CID-db8fd2cde932 (bnc#1157197).\n- CVE-2019-19057: Two memory leaks in drivers/net/wireless/marvell/mwifiex/pcie.c allowed attackers to cause a denial of service (memory consumption), aka CID-d10dcb615c8e (bnc#1157193 bsc#1157197).\n- CVE-2019-19058: A memory leak in drivers/net/wireless/intel/iwlwifi/fw/dbg.c allowed attackers to cause a denial of service (memory consumption), aka CID-b4b814fec1a5 (bnc#1157145).\n- CVE-2019-19060: A memory leak in drivers/iio/imu/adis_buffer.c allowed attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41 (bnc#1157178).\n- CVE-2019-19062: A memory leak in crypto/crypto_user_base.c allowed attackers to cause a denial of service (memory consumption), aka CID-ffdde5932042 (bnc#1157333).\n- CVE-2019-19063: Two memory leaks in drivers/net/wireless/realtek/rtlwifi/usb.c allowed attackers to cause a denial of service (memory consumption), aka CID-3f9361695113 (bnc#1157298).\n- CVE-2019-19065: A memory leak in drivers/infiniband/hw/hfi1/sdma.c allowed attackers to cause a denial of service (memory consumption), aka CID-34b3be18a04e (bnc#1157191).\n- CVE-2019-19066: A memory leak in drivers/scsi/bfa/bfad_attr.c allowed attackers to cause a denial of service (memory consumption), aka CID-0e62395da2bd (bnc#1157303).\n- CVE-2019-19067: There were four unlikely memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c (bnc#1157180).\n- CVE-2019-19068: A memory leak in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allowed attackers to cause a denial of service (memory consumption), aka CID-a2cdd07488e6 (bnc#1157307).\n- CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c allowed attackers to cause a denial of service (memory consumption), aka CID-853acf7caf10 (bnc#1157070).\n- CVE-2019-19074: A memory leak in drivers/net/wireless/ath/ath9k/wmi.c allowed attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4 (bnc#1157143).\n- CVE-2019-19075: A memory leak in drivers/net/ieee802154/ca8210.c allowed attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e (bnc#1157162).\n- CVE-2019-19077: A memory leak in drivers/infiniband/hw/bnxt_re/ib_verbs.c allowed attackers to cause a denial of service (memory consumption), aka CID-4a9d46a9fe14 (bnc#1157171).\n- CVE-2019-19227: In the AppleTalk subsystem there was a potential NULL pointer dereference because register_snap_client may return NULL. This could have led to denial of service, aka CID-9804501fa122 (bnc#1157678).\n- CVE-2019-19318: Mounting a crafted btrfs image twice could have caused a use-after-free (bnc#1158026).\n- CVE-2019-19319: A slab-out-of-bounds write access could have occured when setxattr was called after mounting of a specially crafted ext4 image (bnc#1158021).\n- CVE-2019-19332: An out-of-bounds memory write issue was found in the way the KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could have used this flaw to crash the system (bnc#1158827).\n- CVE-2019-19447: Mounting a crafted ext4 filesystem image, performing some operations, and unmounting could have led to a use-after-free in fs/ext4/super.c (bnc#1158819).\n- CVE-2019-19523: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79 (bsc#1158823).\n- CVE-2019-19524: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9 (bsc#1158413).\n- CVE-2019-19525: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035 (bsc#1158417).\n- CVE-2019-19526: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098 (bsc#1158893).\n- CVE-2019-19527: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e (bsc#1158900).\n- CVE-2019-19528: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d (bsc#1158407).\n- CVE-2019-19529: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver, aka CID-4d6636498c41 (bnc#1158381).\n- CVE-2019-19530: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef (bsc#1158410).\n- CVE-2019-19531: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca (bsc#1158445).\n- CVE-2019-19532: There were multiple out-of-bounds write bugs that can be caused by a malicious USB HID device, aka CID-d9d4b1e46d95 (bsc#1158824).\n- CVE-2019-19533: There was an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464 (bsc#1158834).\n- CVE-2019-19534: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29 (bsc#1158398).\n- CVE-2019-19535: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042 (bsc#1158903).\n- CVE-2019-19536: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0 (bsc#1158394).\n- CVE-2019-19537: There was a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9 (bsc#1158904).\n- CVE-2019-19543: There was a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c (bnc#1158427).\n- CVE-2019-19767: There were multiple use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163 (bnc#1159297).\n- CVE-2019-19965: There was a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5 (bnc#1159911).\n- CVE-2019-19966: There was a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that could have caused a denial of service, aka CID-dea37a972655 (bnc#1159841).\n- CVE-2019-20054: There was a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e (bnc#1159910).\n- CVE-2019-20095: Several memory leaks were found in drivers/net/wireless/marvell/mwifiex/cfg80211.c, aka CID-003b686ace82 (bnc#1159909).\n- CVE-2019-20096: There was a memory leak in __feat_register_sp() in net/dccp/feat.c, aka CID-1d3ff0950e2b (bnc#1159908).\n- CVE-2020-7053: There was a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c (bnc#1160966).\n- CVE-2019-19338: There was an incomplete fix for an issue with Transactional Synchronisation Extensions in the KVM code (bsc#1158954).\n- CVE-2019-19049: There was an unlikely memory leak in unittest_data_add (bsc#1157173).\n\n\nThe following non-security bugs were fixed:\n\n- ACPI / APEI: Do not wait to serialise with oops messages when panic()ing (bsc#1051510).\n- ACPI / LPSS: Exclude I2C busses shared with PUNIT from pmc_atom_d3_mask (bsc#1051510).\n- ACPI / LPSS: Ignore acpi_device_fix_up_power() return value (bsc#1051510).\n- ACPI / SBS: Fix rare oops when removing modules (bsc#1051510).\n- ACPI: bus: Fix NULL pointer check in acpi_bus_get_private_data() (bsc#1051510).\n- ACPI: fix acpi_find_child_device() invocation in acpi_preset_companion() (bsc#1051510).\n- ACPI: OSL: only free map once in osl.c (bsc#1051510).\n- ACPI: sysfs: Change ACPI_MASKABLE_GPE_MAX to 0x100 (bsc#1051510).\n- ACPICA: Never run _REG on system_memory and system_IO (bsc#1051510).\n- ACPICA: Use %d for signed int print formatting instead of %u (bsc#1051510).\n- af_packet: set defaule value for tmo (bsc#1051510).\n- ALSA: 6fire: Drop the dead code (git-fixes).\n- ALSA: control: remove useless assignment in .info callback of PCM chmap element (git-fixes).\n- ALSA: cs4236: fix error return comparison of an unsigned integer (git-fixes).\n- ALSA: echoaudio: simplify get_audio_levels (bsc#1051510).\n- ALSA: fireface: fix return value in error path of isochronous resources reservation (bsc#1051510).\n- ALSA: firewire-motu: Correct a typo in the clock proc string (git-fixes).\n- ALSA: hda - Add docking station support for Lenovo Thinkpad T420s (git-fixes).\n- ALSA: hda - Add mute led support for HP ProBook 645 G4 (git-fixes).\n- ALSA: hda - Downgrade error message for single-cmd fallback (git-fixes).\n- ALSA: hda - Fix pending unsol events at shutdown (git-fixes).\n- ALSA: hda/analog - Minor optimization for SPDIF mux connections (git-fixes).\n- ALSA: hda/ca0132 - Avoid endless loop (git-fixes).\n- ALSA: hda/ca0132 - Fix work handling in delayed HP detection (git-fixes).\n- ALSA: hda/ca0132 - Keep power on during processing DSP response (git-fixes).\n- ALSA: hda/hdmi - Add new pci ids for AMD GPU display audio (git-fixes).\n- ALSA: hda/hdmi - add retry logic to parse_intel_hdmi() (git-fixes).\n- ALSA: hda/hdmi - fix atpx_present when CLASS is not VGA (bsc#1051510).\n- ALSA: hda/hdmi - Fix duplicate unref of pci_dev (bsc#1051510).\n- ALSA: hda/hdmi - fix vgaswitcheroo detection for AMD (git-fixes).\n- ALSA: hda/realtek - Add headset Mic no shutup for ALC283 (bsc#1051510).\n- ALSA: hda/realtek - Dell headphone has noise on unmute for ALC236 (git-fixes).\n- ALSA: hda/realtek - Line-out jack does not work on a Dell AIO (bsc#1051510).\n- ALSA: hda/realtek - Move some alc236 pintbls to fallback table (git-fixes).\n- ALSA: hda/realtek - Move some alc256 pintbls to fallback table (git-fixes).\n- ALSA: hda: Add Clevo W65_67SB the power_save blacklist (git-fixes).\n- ALSA: i2c/cs8427: Fix int to char conversion (bsc#1051510).\n- ALSA: ice1724: Fix sleep-in-atomic in Infrasonic Quartet support code (bsc#1051510).\n- ALSA: intel8x0m: Register irq handler after register initializations (bsc#1051510).\n- ALSA: oxfw: fix return value in error path of isochronous resources reservation (bsc#1051510).\n- ALSA: pcm: Avoid possible info leaks from PCM stream buffers (git-fixes).\n- ALSA: pcm: oss: Avoid potential buffer overflows (git-fixes).\n- ALSA: pcm: signedness bug in snd_pcm_plug_alloc() (bsc#1051510).\n- ALSA: seq: Do error checks at creating system ports (bsc#1051510).\n- ALSA: seq: Fix racy access for queue timer in proc read (bsc#1051510).\n- ALSA: sh: Fix compile warning wrt const (git-fixes).\n- ALSA: usb-audio: Fix Focusrite Scarlett 6i6 gen1 - input handling (git-fixes).\n- ALSA: usb-audio: fix set_format altsetting sanity check (bsc#1051510).\n- ALSA: usb-audio: fix sync-ep altsetting sanity check (bsc#1051510).\n- apparmor: fix unsigned len comparison with less than zero (git-fixes).\n- appledisplay: fix error handling in the scheduled work (git-fixes).\n- ar5523: check NULL before memcpy() in ar5523_cmd() (bsc#1051510).\n- ASoC: au8540: use 64-bit arithmetic instead of 32-bit (bsc#1051510).\n- ASoC: compress: fix unsigned integer overflow check (bsc#1051510).\n- ASoC: cs4349: Use PM ops \u0027cs4349_runtime_pm\u0027 (bsc#1051510).\n- ASoC: davinci-mcasp: Handle return value of devm_kasprintf (stable 4.14.y).\n- ASoC: davinci: Kill BUG_ON() usage (stable 4.14.y).\n- ASoC: dpcm: Properly initialise hw-\u003erate_max (bsc#1051510).\n- ASoC: Intel: hdac_hdmi: Limit sampling rates at dai creation (bsc#1051510).\n- ASoC: Jack: Fix NULL pointer dereference in snd_soc_jack_report (bsc#1051510).\n- ASoC: kirkwood: fix external clock probe defer (git-fixes).\n- ASoC: msm8916-wcd-analog: Fix RX1 selection in RDAC2 MUX (git-fixes).\n- ASoC: msm8916-wcd-analog: Fix selected events for MIC BIAS External1 (bsc#1051510).\n- ASoC: sgtl5000: avoid division by zero if lo_vag is zero (bsc#1051510).\n- ASoC: tegra_sgtl5000: fix device_node refcounting (bsc#1051510).\n- ASoC: tlv320aic31xx: Handle inverted BCLK in non-DSP modes (stable 4.14.y).\n- ASoC: tlv320dac31xx: mark expected switch fall-through (stable 4.14.y).\n- ASoC: wm8962: fix lambda value (git-fixes).\n- ata: ep93xx: Use proper enums for directions (bsc#1051510).\n- ath10k: fix fw crash by moving chip reset after napi disabled (bsc#1051510).\n- ath10k: fix kernel panic by moving pci flush after napi_disable (bsc#1051510).\n- ath10k: fix vdev-start timeout on error (bsc#1051510).\n- ath10k: limit available channels via DT ieee80211-freq-limit (bsc#1051510).\n- ath10k: wmi: disable softirq\u0027s while calling ieee80211_rx (bsc#1051510).\n- ath6kl: Fix off by one error in scan completion (bsc#1051510).\n- ath9k: add back support for using active monitor interfaces for tx99 (bsc#1051510).\n- ath9k: Fix a locking bug in ath9k_add_interface() (bsc#1051510).\n- ath9k: fix reporting calculated new FFT upper max (bsc#1051510).\n- ath9k: fix storage endpoint lookup (git-fixes).\n- ath9k: fix tx99 with monitor mode interface (bsc#1051510).\n- ath9k_hw: fix uninitialized variable data (bsc#1051510).\n- atl1e: checking the status of atl1e_write_phy_reg (bsc#1051510).\n- audit: Allow auditd to set pid to 0 to end auditing (bsc#1158094).\n- ax88172a: fix information leak on short answers (bsc#1051510).\n- backlight: lm3639: Unconditionally call led_classdev_unregister (bsc#1051510).\n- batman-adv: Fix DAT candidate selection on little endian systems (bsc#1051510).\n- bcma: remove set but not used variable \u0027sizel\u0027 (git-fixes).\n- Bluetooth: btusb: fix PM leak in error case of setup (bsc#1051510).\n- Bluetooth: delete a stray unlock (bsc#1051510).\n- Bluetooth: Fix invalid-free in bcsp_close() (git-fixes).\n- Bluetooth: Fix memory leak in hci_connect_le_scan (bsc#1051510).\n- Bluetooth: hci_bcm: Handle specific unknown packets after firmware loading (bsc#1051510).\n- Bluetooth: hci_core: fix init for HCI_USER_CHANNEL (bsc#1051510).\n- Bluetooth: L2CAP: Detect if remote is not able to use the whole MPS (bsc#1051510).\n- bonding: fix active-backup transition after link failure (git-fixes).\n- bonding: fix slave stuck in BOND_LINK_FAIL state (networking-stable-19_11_10).\n- bonding: fix state transition issue in link monitoring (networking-stable-19_11_10).\n- bpf: Make use of probe_user_write in probe write helper (bsc#1083647).\n- brcmfmac: fix full timeout waiting for action frame on-channel tx (bsc#1051510).\n- brcmfmac: fix interface sanity check (git-fixes).\n- brcmfmac: Fix memory leak in brcmf_usbdev_qinit (git-fixes).\n- brcmfmac: Fix use after free in brcmf_sdio_readframes() (git-fixes).\n- brcmfmac: reduce timeout for action frame scan (bsc#1051510).\n- brcmsmac: AP mode: update beacon when TIM changes (bsc#1051510).\n- brcmsmac: never log \u0027tid x is not agg\u0027able\u0027 by default (bsc#1051510).\n- btrfs: abort transaction after failed inode updates in create_subvol (bsc#1161936).\n- btrfs: add missing extents release on file extent cluster relocation error (bsc#1159483).\n- btrfs: avoid fallback to transaction commit during fsync of files with holes (bsc#1159569).\n- btrfs: dev-replace: remove warning for unknown return codes when finished (dependency for bsc#1162067).\n- btrfs: do not call synchronize_srcu() in inode_tree_del (bsc#1161934).\n- btrfs: Ensure we trim ranges across block group boundary (bsc#1151910).\n- btrfs: fix block group remaining RO forever after error during device replace (bsc#1160442).\n- btrfs: fix infinite loop during nocow writeback due to race (bsc#1160804).\n- btrfs: fix integer overflow in calc_reclaim_items_nr (bsc#1160433).\n- btrfs: fix missing data checksums after replaying a log tree (bsc#1161931).\n- btrfs: fix negative subv_writers counter and data space leak after buffered write (bsc#1160802).\n- btrfs: fix removal logic of the tree mod log that leads to use-after-free issues (bsc#1160803).\n- btrfs: fix selftests failure due to uninitialized i_mode in test inodes (Fix for dependency of bsc#1157692).\n- btrfs: handle ENOENT in btrfs_uuid_tree_iterate (bsc#1161937).\n- btrfs: harden agaist duplicate fsid on scanned devices (bsc#1134973).\n- btrfs: inode: Verify inode mode to avoid NULL pointer dereference (dependency for bsc#1157692).\n- btrfs: make tree checker detect checksum items with overlapping ranges (bsc#1161931).\n- btrfs: Move btrfs_check_chunk_valid() to tree-check.[ch] and export it (dependency for bsc#1157692).\n- btrfs: record all roots for rename exchange on a subvol (bsc#1161933).\n- btrfs: relocation: fix reloc_root lifespan and access (bsc#1159588).\n- btrfs: scrub: Require mandatory block group RO for dev-replace (bsc#1162067).\n- btrfs: simplify inode locking for RWF_NOWAIT (git-fixes).\n- btrfs: skip log replay on orphaned roots (bsc#1161935).\n- btrfs: tree-checker: Check chunk item at tree block read time (dependency for bsc#1157692).\n- btrfs: tree-checker: Check level for leaves and nodes (dependency for bsc#1157692).\n- btrfs: tree-checker: Enhance chunk checker to validate chunk profile (dependency for bsc#1157692).\n- btrfs: tree-checker: Fix wrong check on max devid (fixes for dependency of bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in block_group_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_block_group_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_csum_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_dev_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_dir_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_extent_data_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_inode_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_leaf (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_leaf_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in chunk_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in dev_item_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in dir_item_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in file_extent_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in generic_err (dependency for bsc#1157692).\n- btrfs: tree-checker: Make btrfs_check_chunk_valid() return EUCLEAN instead of EIO (dependency for bsc#1157692).\n- btrfs: tree-checker: Make chunk item checker messages more readable (dependency for bsc#1157692).\n- btrfs: tree-checker: Verify dev item (dependency for bsc#1157692).\n- btrfs: tree-checker: Verify inode item (dependency for bsc#1157692).\n- btrfs: volumes: Use more straightforward way to calculate map length (bsc#1151910).\n- can, slip: Protect tty-\u003edisc_data in write_wakeup and close with RCU (bsc#1051510).\n- can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs (bsc#1051510).\n- can: c_can: c_can_poll(): only read status register after status IRQ (git-fixes).\n- can: c_can: D_CAN: c_can_chip_config(): perform a sofware reset on open (bsc#1051510).\n- can: gs_usb: gs_usb_probe(): use descriptors of current altsetting (bsc#1051510).\n- can: mcba_usb: fix use-after-free on disconnect (git-fixes).\n- can: mscan: mscan_rx_poll(): fix rx path lockup when returning from polling to irq mode (bsc#1051510).\n- can: peak_usb: fix a potential out-of-sync while decoding packets (git-fixes).\n- can: peak_usb: fix slab info leak (git-fixes).\n- can: peak_usb: report bus recovery as well (bsc#1051510).\n- can: rx-offload: can_rx_offload_irq_offload_fifo(): continue on error (bsc#1051510).\n- can: rx-offload: can_rx_offload_irq_offload_timestamp(): continue on error (bsc#1051510).\n- can: rx-offload: can_rx_offload_offload_one(): do not increase the skb_queue beyond skb_queue_len_max (git-fixes).\n- can: rx-offload: can_rx_offload_offload_one(): increment rx_fifo_errors on queue overflow or OOM (bsc#1051510).\n- can: rx-offload: can_rx_offload_offload_one(): use ERR_PTR() to propagate error value in case of errors (bsc#1051510).\n- can: rx-offload: can_rx_offload_queue_sorted(): fix error handling, avoid skb mem leak (git-fixes).\n- can: rx-offload: can_rx_offload_queue_tail(): fix error handling, avoid skb mem leak (git-fixes).\n- can: slcan: Fix use-after-free Read in slcan_open (bsc#1051510).\n- can: usb_8dev: fix use-after-free on disconnect (git-fixes).\n- CDC-NCM: handle incomplete transfer of MTU (networking-stable-19_11_10).\n- ceph: add missing check in d_revalidate snapdir handling (bsc#1157183).\n- ceph: do not try to handle hashed dentries in non-O_CREAT atomic_open (bsc#1157184).\n- ceph: fix use-after-free in __ceph_remove_cap() (bsc#1154058).\n- ceph: just skip unrecognized info in ceph_reply_info_extra (bsc#1157182).\n- cfg80211/mac80211: make ieee80211_send_layer2_update a public function (bsc#1051510).\n- cfg80211: Avoid regulatory restore when COUNTRY_IE_IGNORE is set (bsc#1051510).\n- cfg80211: call disconnect_wk when AP stops (bsc#1051510).\n- cfg80211: check for set_wiphy_params (bsc#1051510).\n- cfg80211: fix page refcount issue in A-MSDU decap (bsc#1051510).\n- cfg80211: Prevent regulatory restore during STA disconnect in concurrent interfaces (bsc#1051510).\n- cgroup,writeback: do not switch wbs immediately on dead wbs if the memcg is dead (bsc#1158645).\n- cgroup: pids: use atomic64_t for pids-\u003elimit (bsc#1161514).\n- cifs: add a helper to find an existing readable handle to a file (bsc#1144333, bsc#1154355).\n- cifs: add support for flock (bsc#1144333).\n- cifs: avoid using MID 0xFFFF (bsc#1144333, bsc#1154355).\n- cifs: Close cached root handle only if it had a lease (bsc#1144333).\n- cifs: Close open handle after interrupted close (bsc#1144333).\n- cifs: close the shared root handle on tree disconnect (bsc#1144333).\n- cifs: create a helper to find a writeable handle by path name (bsc#1144333, bsc#1154355).\n- cifs: Do not miss cancelled OPEN responses (bsc#1144333).\n- cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bsc#1144333, bsc#1154355).\n- cifs: Fix lookup of root ses in DFS referral cache (bsc#1144333).\n- cifs: fix max ea value size (bsc#1144333, bsc#1154355).\n- cifs: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1144333).\n- cifs: Fix missed free operations (bsc#1144333, bsc#1154355).\n- cifs: Fix mount options set in automount (bsc#1144333).\n- cifs: Fix NULL pointer dereference in mid callback (bsc#1144333).\n- cifs: Fix NULL-pointer dereference in smb2_push_mandatory_locks (bsc#1144333).\n- cifs: Fix oplock handling for SMB 2.1+ protocols (bsc#1144333, bsc#1154355).\n- cifs: Fix potential softlockups while refreshing DFS cache (bsc#1144333).\n- cifs: Fix retrieval of DFS referrals in cifs_mount() (bsc#1144333).\n- cifs: Fix retry mid list corruption on reconnects (bsc#1144333, bsc#1154355).\n- cifs: Fix SMB2 oplock break processing (bsc#1144333, bsc#1154355).\n- cifs: Fix use after free of file info structures (bsc#1144333, bsc#1154355).\n- cifs: Fix use-after-free bug in cifs_reconnect() (bsc#1144333).\n- cifs: Force reval dentry if LOOKUP_REVAL flag is set (bsc#1144333, bsc#1154355).\n- cifs: Force revalidate inode when dentry is stale (bsc#1144333, bsc#1154355).\n- cifs: Gracefully handle QueryInfo errors during open (bsc#1144333, bsc#1154355).\n- cifs: move cifsFileInfo_put logic into a work-queue (bsc#1144333, bsc#1154355).\n- cifs: prepare SMB2_Flush to be usable in compounds (bsc#1144333, bsc#1154355).\n- cifs: Properly process SMB3 lease breaks (bsc#1144333).\n- cifs: remove set but not used variables \u0027cinode\u0027 and \u0027netfid\u0027 (bsc#1144333).\n- cifs: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1144333).\n- cifs: set domainName when a domain-key is used in multiuser (bsc#1144333, bsc#1154355).\n- cifs: use cifsInodeInfo-\u003eopen_file_lock while iterating to avoid a panic (bsc#1144333, bsc#1154355).\n- cifs: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#1144333, bsc#1154355).\n- cifs: Use kzfree() to zero out the password (bsc#1144333, bsc#1154355).\n- clk: at91: avoid sleeping early (git-fixes).\n- clk: Do not try to enable critical clocks if prepare failed (bsc#1051510).\n- clk: pxa: fix one of the pxa RTC clocks (bsc#1051510).\n- clk: rockchip: fix I2S1 clock gate register for rk3328 (bsc#1051510).\n- clk: rockchip: fix ID of 8ch clock of I2S1 for rk3328 (bsc#1051510).\n- clk: rockchip: fix rk3188 sclk_mac_lbtest parameter ordering (bsc#1051510).\n- clk: rockchip: fix rk3188 sclk_smc gate data (bsc#1051510).\n- clk: samsung: exynos5420: Preserve CPU clocks configuration during suspend/resume (bsc#1051510).\n- clk: samsung: exynos5420: Preserve PLL configuration during suspend/resume (git-fixes).\n- clk: samsung: Use clk_hw API for calling clk framework from clk notifiers (bsc#1051510).\n- clk: sunxi-ng: a80: fix the zero\u0027ing of bits 16 and 18 (git-fixes).\n- clk: sunxi: sun9i-mmc: Implement reset callback for reset controls (bsc#1051510).\n- clocksource/drivers/sh_cmt: Fix clocksource width for 32-bit machines (bsc#1051510).\n- clocksource/drivers/sh_cmt: Fixup for 64-bit machines (bsc#1051510).\n- compat_ioctl: handle SIOCOUTQNSD (bsc#1051510).\n- component: fix loop condition to call unbind() if bind() fails (bsc#1051510).\n- configfs_register_group() shouldn\u0027t be (and isn\u0027t) called in rmdirable parts (bsc#1051510).\n- copy/pasted \u0027Recommends:\u0027 instead of \u0027Provides:\u0027, \u0027Obsoletes:\u0027 and \u0027Conflicts:\n- Cover up kABI breakage due to DH key verification (bsc#1155331).\n- cpufreq/pasemi: fix use-after-free in pas_cpufreq_cpu_init() (bsc#1051510).\n- cpufreq: intel_pstate: Register when ACPI PCCH is present (bsc#1051510).\n- cpufreq: powernv: fix stack bloat and hard limit on number of CPUs (bsc#1051510).\n- cpufreq: Skip cpufreq resume if it\u0027s not suspended (bsc#1051510).\n- cpufreq: ti-cpufreq: add missing of_node_put() (bsc#1051510).\n- cpupower : Fix cpupower working when cpu0 is offline (bsc#1051510).\n- cpupower : frequency-set -r option misses the last cpu in related cpu list (bsc#1051510).\n- cpupower: Fix coredump on VMWare (bsc#1051510).\n- crypto: af_alg - cast ki_complete ternary op to int (bsc#1051510).\n- crypto: af_alg - Use bh_lock_sock in sk_destruct (bsc#1051510).\n- crypto: api - Check spawn-\u003ealg under lock in crypto_drop_spawn (bsc#1051510).\n- crypto: atmel-sha - fix error handling when setting hmac key (bsc#1051510).\n- crypto: ccp - fix uninitialized list head (bsc#1051510).\n- crypto: chelsio - fix writing tfm flags to wrong place (bsc#1051510).\n- crypto: crypto4xx - fix double-free in crypto4xx_destroy_sdr (bsc#1051510).\n- crypto: dh - add public key verification test (bsc#1155331).\n- crypto: dh - fix calculating encoded key size (bsc#1155331).\n- crypto: dh - fix memory leak (bsc#1155331).\n- crypto: dh - update test for public key verification (bsc#1155331).\n- crypto: DRBG - add FIPS 140-2 CTRNG for noise source (bsc#1155334).\n- crypto: ecdh - add public key verification test (bsc#1155331).\n- crypto: ecdh - fix big endian bug in ECC library (bsc#1051510).\n- crypto: ecdh - fix typo of P-192 b value (bsc#1155331).\n- crypto: fix a memory leak in rsa-kcs1pad\u0027s encryption mode (bsc#1051510).\n- crypto: geode-aes - switch to skcipher for cbc(aes) fallback (bsc#1051510).\n- crypto: mxc-scc - fix build warnings on ARM64 (bsc#1051510).\n- crypto: mxs-dcp - Fix AES issues (bsc#1051510).\n- crypto: mxs-dcp - Fix SHA null hashes and output length (bsc#1051510).\n- crypto: mxs-dcp - make symbols \u0027sha1_null_hash\u0027 and \u0027sha256_null_hash\u0027 static (bsc#1051510).\n- crypto: pcrypt - Do not clear MAY_SLEEP flag in original request (bsc#1051510).\n- crypto: picoxcell - adjust the position of tasklet_init and fix missed tasklet_kill (bsc#1051510).\n- crypto: s5p-sss: Fix Fix argument list alignment (bsc#1051510).\n- crypto: tgr192 - remove unneeded semicolon (bsc#1051510).\n- cw1200: Fix a signedness bug in cw1200_load_firmware() (bsc#1051510).\n- cxgb4: fix panic when attaching to ULD fail (networking-stable-19_11_05).\n- cxgb4: request the TX CIDX updates to status page (bsc#1127371).\n- dccp: do not leak jiffies on the wire (networking-stable-19_11_05).\n- dlm: do not leak kernel pointer to userspace (bsc#1051510).\n- dlm: fix invalid free (bsc#1051510).\n- dma-buf: Fix memory leak in sync_file_merge() (git-fixes).\n- dma-mapping: fix return type of dma_set_max_seg_size() (bsc#1051510).\n- dmaengine: coh901318: Fix a double-lock bug (bsc#1051510).\n- dmaengine: coh901318: Remove unused variable (bsc#1051510).\n- dmaengine: dma-jz4780: Do not depend on MACH_JZ4780 (bsc#1051510).\n- dmaengine: dma-jz4780: Further residue status fix (bsc#1051510).\n- dmaengine: ep93xx: Return proper enum in ep93xx_dma_chan_direction (bsc#1051510).\n- dmaengine: Fix access to uninitialized dma_slave_caps (bsc#1051510).\n- dmaengine: imx-sdma: fix use-after-free on probe error path (bsc#1051510).\n- dmaengine: rcar-dmac: set scatter/gather max segment size (bsc#1051510).\n- dmaengine: timb_dma: Use proper enum in td_prep_slave_sg (bsc#1051510).\n- docs: move protection-keys.rst to the core-api book (bsc#1078248).\n- Documentation: debugfs: Document debugfs helper for unsigned long values (git-fixes).\n- Documentation: x86: convert protection-keys.txt to reST (bsc#1078248).\n- drivers/base/memory.c: cache blocks in radix tree to accelerate lookup (bsc#1159955 ltc#182993).\n- drivers/base/platform.c: kmemleak ignore a known leak (bsc#1051510).\n- drivers/regulator: fix a missing check of return value (bsc#1051510).\n- drm/amdgpu: fix bad DMA from INTERRUPT_CNTL2 (bsc#1114279)\n- drm/dp_mst: correct the shifting in DP_REMOTE_I2C_READ (bsc#1051510).\n- drm/etnaviv: fix dumping of iommuv2 (bsc#1113722)\n- drm/fb-helper: Round up bits_per_pixel if possible (bsc#1051510).\n- drm/i810: Prevent underflow in ioctl (bsc#1114279)\n- drm/i915: Add missing include file \u003clinux/math64.h\u003e (bsc#1051510).\n- drm/i915: Fix pid leak with banned clients (bsc#1114279)\n- drm/mst: Fix MST sideband up-reply failure handling (bsc#1051510).\n- drm/omap: fix max fclk divider for omap36xx (bsc#1113722)\n- drm/qxl: Return error if fbdev is not 32 bpp (bsc#1159028)\n- drm/radeon: fix bad DMA from INTERRUPT_CNTL2 (git-fixes).\n- drm/radeon: fix r1xx/r2xx register checker for POT textures (bsc#1114279)\n- drm/radeon: fix si_enable_smc_cac() failed issue (bsc#1113722)\n- drm/rockchip: Round up _before_ giving to the clock framework (bsc#1114279)\n- drm: limit to INT_MAX in create_blob ioctl (bsc#1051510).\n- drm: meson: venc: cvbs: fix CVBS mode matching (bsc#1051510).\n- drm: panel-lvds: Potential Oops in probe error handling (bsc#1114279)\n- e1000e: Add support for Comet Lake (bsc#1158533).\n- e1000e: Add support for Tiger Lake (bsc#1158533).\n- e1000e: Drop unnecessary __E1000_DOWN bit twiddling (bsc#1158049).\n- e1000e: Increase pause and refresh time (bsc#1158533).\n- e1000e: Use dev_get_drvdata where possible (bsc#1158049).\n- e1000e: Use rtnl_lock to prevent race conditions between net and pci/pm (bsc#1158049).\n- e100: Fix passing zero to \u0027PTR_ERR\u0027 warning in e100_load_ucode_wait (bsc#1051510).\n- ecryptfs_lookup_interpose(): lower_dentry-\u003ed_inode is not stable (bsc#1158646).\n- ecryptfs_lookup_interpose(): lower_dentry-\u003ed_parent is not stable either (bsc#1158647).\n- EDAC/ghes: Fix locking and memory barrier issues (bsc#1114279). EDAC/ghes: Do not warn when incrementing refcount on 0 (bsc#1114279).\n- EDAC/ghes: Fix Use after free in ghes_edac remove path (bsc#1114279).\n- exit: panic before exit_mm() on global init exit (bsc#1161549).\n- ext4: fix punch hole for inline_data file systems (bsc#1158640).\n- ext4: update direct I/O read lock pattern for IOCB_NOWAIT (bsc#1158639).\n- extcon: cht-wc: Return from default case to avoid warnings (bsc#1051510).\n- extcon: max8997: Fix lack of path setting in USB device mode (bsc#1051510).\n- fbdev: sbuslib: integer overflow in sbusfb_ioctl_helper() (bsc#1051510).\n- fbdev: sbuslib: use checked version of put_user() (bsc#1051510).\n- fjes: fix missed check in fjes_acpi_add (bsc#1051510).\n- fs: cifs: Fix atime update check vs mtime (bsc#1144333).\n- ftrace: Avoid potential division by zero in function profiler (bsc#1160784).\n- ftrace: Introduce PERMANENT ftrace_ops flag (bsc#1120853).\n- genirq: Prevent NULL pointer dereference in resend_irqs() (bsc#1051510).\n- genirq: Properly pair kobject_del() with kobject_add() (bsc#1051510).\n- gpio: Fix error message on out-of-range GPIO in lookup table (bsc#1051510).\n- gpio: mpc8xxx: Do not overwrite default irq_set_type callback (bsc#1051510).\n- gpio: syscon: Fix possible NULL ptr usage (bsc#1051510).\n- gpiolib: acpi: Add Terra Pad 1061 to the run_edge_events_on_boot_blacklist (bsc#1051510).\n- gsmi: Fix bug in append_to_eventlog sysfs handler (bsc#1051510).\n- HID: Add ASUS T100CHI keyboard dock battery quirks (bsc#1051510).\n- HID: Add quirk for Microsoft PIXART OEM mouse (bsc#1051510).\n- HID: asus: Add T100CHI bluetooth keyboard dock special keys mapping (bsc#1051510).\n- HID: doc: fix wrong data structure reference for UHID_OUTPUT (bsc#1051510).\n- HID: Fix assumption that devices have inputs (git-fixes).\n- HID: hidraw, uhid: Always report EPOLLOUT (bsc#1051510).\n- HID: hidraw: Fix returning EPOLLOUT from hidraw_poll (bsc#1051510).\n- HID: intel-ish-hid: fixes incorrect error handling (bsc#1051510).\n- HID: uhid: Fix returning EPOLLOUT from uhid_char_poll (bsc#1051510).\n- HID: wacom: generic: Treat serial number and related fields as unsigned (git-fixes).\n- hidraw: Return EPOLLOUT from hidraw_poll (bsc#1051510).\n- hwmon: (ina3221) Fix INA3221_CONFIG_MODE macros (bsc#1051510).\n- hwmon: (pwm-fan) Silence error on probe deferral (bsc#1051510).\n- hwrng: omap - Fix RNG wait loop timeout (bsc#1051510).\n- hwrng: omap3-rom - Call clk_disable_unprepare() on exit only if not idled (bsc#1051510).\n- hwrng: stm32 - fix unbalanced pm_runtime_enable (bsc#1051510).\n- hypfs: Fix error number left in struct pointer member (bsc#1051510).\n- i2c: imx: do not print error message on probe defer (bsc#1051510).\n- ibmveth: Detect unsupported packets before sending to the hypervisor (bsc#1159484 ltc#182983).\n- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).\n- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).\n- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).\n- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).\n- idr: Fix idr_alloc_u32 on 32-bit systems (bsc#1051510).\n- iio: adc: max9611: explicitly cast gain_selectors (bsc#1051510).\n- iio: adc: max9611: Fix too short conversion time delay (bsc#1051510).\n- iio: adc: stm32-adc: fix stopping dma (git-fixes).\n- iio: buffer: align the size of scan bytes to size of the largest element (bsc#1051510).\n- iio: dac: mcp4922: fix error handling in mcp4922_write_raw (bsc#1051510).\n- iio: imu: adis16480: assign bias value only if operation succeeded (git-fixes).\n- iio: imu: adis16480: make sure provided frequency is positive (git-fixes).\n- iio: imu: adis: assign read val in debugfs hook only if op successful (git-fixes).\n- iio: imu: adis: assign value only if return code zero in read funcs (git-fixes).\n- include/linux/bitrev.h: fix constant bitrev (bsc#1114279).\n- inet: protect against too small mtu values (networking-stable-19_12_16).\n- inet: stop leaking jiffies on the wire (networking-stable-19_11_05).\n- init: add arch_call_rest_init to allow stack switching (jsc#SLE-11179).\n- Input: aiptek - fix endpoint sanity check (bsc#1051510).\n- Input: cyttsp4_core - fix use after free bug (bsc#1051510).\n- Input: ff-memless - kill timer in destroy() (bsc#1051510).\n- Input: goodix - add upside-down quirk for Teclast X89 tablet (bsc#1051510).\n- Input: gtco - fix endpoint sanity check (bsc#1051510).\n- Input: keyspan-remote - fix control-message timeouts (bsc#1051510).\n- Input: pegasus_notetaker - fix endpoint sanity check (bsc#1051510).\n- Input: pm8xxx-vib - fix handling of separate enable register (bsc#1051510).\n- Input: rmi_f54 - read from FIFO in 32 byte blocks (bsc#1051510).\n- Input: silead - try firmware reload after unsuccessful resume (bsc#1051510).\n- Input: st1232 - set INPUT_PROP_DIRECT property (bsc#1051510).\n- Input: sun4i-ts - add a check for devm_thermal_zone_of_sensor_register (bsc#1051510).\n- Input: sur40 - fix interface sanity checks (bsc#1051510).\n- Input: synaptics - switch another X1 Carbon 6 to RMI/SMbus (bsc#1051510).\n- Input: synaptics-rmi4 - clear IRQ enables for F54 (bsc#1051510).\n- Input: synaptics-rmi4 - destroy F54 poller workqueue when removing (bsc#1051510).\n- Input: synaptics-rmi4 - disable the relative position IRQ in the F12 driver (bsc#1051510).\n- Input: synaptics-rmi4 - do not consume more data than we have (F11, F12) (bsc#1051510).\n- Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers (bsc#1051510).\n- Input: synaptics-rmi4 - fix video buffer size (git-fixes).\n- Input: synaptics-rmi4 - simplify data read in rmi_f54_work (bsc#1051510).\n- intel_th: Fix a double put_device() in error path (git-fixes).\n- iomap: Fix pipe page leakage during splicing (bsc#1158651).\n- iommu/vt-d: Fix QI_DEV_IOTLB_PFSID and QI_DEV_EIOTLB_PFSID macros (bsc#1158063).\n- iommu/vt-d: Unlink device if failed to add to group (bsc#1160756).\n- iommu: Remove device link to group on failure (bsc#1160755).\n- ipmi:dmi: Ignore IPMI SMBIOS entries with a zero base address (bsc#1051510).\n- ipv4: Fix table id reference in fib_sync_down_addr (networking-stable-19_11_10).\n- ipv4: Return -ENETUNREACH if we can\u0027t create route but saddr is valid (networking-stable-19_10_24).\n- iwlegacy: ensure loop counter addr does not wrap and cause an infinite loop (git-fixes).\n- iwlwifi: api: annotate compressed BA notif array sizes (bsc#1051510).\n- iwlwifi: check kasprintf() return value (bsc#1051510).\n- iwlwifi: mvm: avoid sending too many BARs (bsc#1051510).\n- iwlwifi: mvm: do not send keys when entering D3 (bsc#1051510).\n- iwlwifi: mvm: Send non offchannel traffic via AP sta (bsc#1051510).\n- iwlwifi: mvm: synchronize TID queue removal (bsc#1051510).\n- kABI workaround for ath10k last_wmi_vdev_start_status field (bsc#1051510).\n- kABI workaround for can/skb.h inclusion (bsc#1051510).\n- kABI workaround for struct mwifiex_power_cfg change (bsc#1051510).\n- kABI: add _q suffix to exports that take struct dh (bsc#1155331).\n- kABI: Fix for \u0027KVM: x86: Introduce vcpu-\u003earch.xsaves_enabled\u0027 (bsc#1158066).\n- kABI: protect struct sctp_ep_common (kabi).\n- kernel/trace: Fix do not unregister tracepoints when register sched_migrate_task fail (bsc#1160787).\n- kernfs: Fix range checks in kernfs_get_target_path (bsc#1051510).\n- kexec: bail out upon SIGKILL when allocating memory (git-fixes).\n- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl (git-fixes).\n- KVM: s390: Test for bad access register and size at the start of S390_MEM_OP (git-fixes).\n- KVM: SVM: Guard against DEACTIVATE when performing WBINVD/DF_FLUSH (bsc#1114279).\n- KVM: SVM: Serialize access to the SEV ASID bitmap (bsc#1114279).\n- KVM: VMX: Consider PID.PIR to determine if vCPU has pending interrupts (bsc#1158064).\n- KVM: VMX: Fix conditions for guest IA32_XSS support (bsc#1158065).\n- KVM: x86/mmu: Take slots_lock when using kvm_mmu_zap_all_fast() (bsc#1158067).\n- KVM: x86: Host feature SSBD does not imply guest feature SPEC_CTRL_SSBD (bsc#1160476).\n- KVM: x86: Introduce vcpu-\u003earch.xsaves_enabled (bsc#1158066).\n- KVM: x86: Remove a spurious export of a static function (bsc#1158954).\n- leds: Allow to call led_classdev_unregister() unconditionally (bsc#1161674).\n- leds: class: ensure workqueue is initialized before setting brightness (bsc#1161674).\n- liquidio: fix race condition in instruction completion processing (bsc#1051510).\n- livepatch: Allow to distinguish different version of system state changes (bsc#1071995).\n- livepatch: Basic API to track system state changes (bsc#1071995 ).\n- livepatch: Keep replaced patches until post_patch callback is called (bsc#1071995).\n- livepatch: Selftests of the API for tracking system state changes (bsc#1071995).\n- livepatch: Simplify stack trace retrieval (jsc#SLE-11179).\n- loop: add ioctl for changing logical block size (bsc#1108043).\n- loop: fix no-unmap write-zeroes request behavior (bsc#1158637).\n- mac80211: consider QoS Null frames for STA_NULLFUNC_ACKED (bsc#1051510).\n- mac80211: Do not send Layer 2 Update frame before authorization (bsc#1051510).\n- mac80211: fix station inactive_time shortly after boot (bsc#1051510).\n- mac80211: minstrel: fix CCK rate group streams value (bsc#1051510).\n- mac80211: minstrel: fix sampling/reporting of CCK rates in HT mode (bsc#1051510).\n- macvlan: do not assume mac_header is set in macvlan_broadcast() (bsc#1051510).\n- macvlan: schedule bc_work even if error (bsc#1051510).\n- macvlan: use skb_reset_mac_header() in macvlan_queue_xmit() (bsc#1051510).\n- mailbox: mailbox-test: fix null pointer if no mmio (bsc#1051510).\n- mailbox: reset txdone_method TXDONE_BY_POLL if client knows_txdone (git-fixes).\n- media: au0828: Fix incorrect error messages (bsc#1051510).\n- media: bdisp: fix memleak on release (git-fixes).\n- media: cec.h: CEC_OP_REC_FLAG_ values were swapped (bsc#1051510).\n- media: cec: report Vendor ID after initialization (bsc#1051510).\n- media: cxusb: detect cxusb_ctrl_msg error in query (bsc#1051510).\n- media: davinci: Fix implicit enum conversion warning (bsc#1051510).\n- media: exynos4-is: Fix recursive locking in isp_video_release() (git-fixes).\n- media: fix: media: pci: meye: validate offset to avoid arbitrary access (bsc#1051510).\n- media: flexcop-usb: ensure -EIO is returned on error condition (git-fixes).\n- media: imon: invalid dereference in imon_touch_event (bsc#1051510).\n- media: isif: fix a NULL pointer dereference bug (bsc#1051510).\n- media: ov6650: Fix control handler not freed on init error (git-fixes).\n- media: pci: ivtv: Fix a sleep-in-atomic-context bug in ivtv_yuv_init() (bsc#1051510).\n- media: pulse8-cec: return 0 when invalidating the logical address (bsc#1051510).\n- media: pxa_camera: Fix check for pdev-\u003edev.of_node (bsc#1051510).\n- media: radio: wl1273: fix interrupt masking on release (git-fixes).\n- media: stkwebcam: Bugfix for wrong return values (bsc#1051510).\n- media: ti-vpe: vpe: Fix Motion Vector vpdma stride (git-fixes).\n- media: usbvision: Fix races among open, close, and disconnect (bsc#1051510).\n- media: uvcvideo: Fix error path in control parsing failure (git-fixes).\n- media: v4l2-ctrl: fix flags for DO_WHITE_BALANCE (bsc#1051510).\n- media: vim2m: Fix abort issue (git-fixes).\n- media: vivid: Set vid_cap_streaming and vid_out_streaming to true (bsc#1051510).\n- mei: bus: prefix device names on bus with the bus name (bsc#1051510).\n- mei: fix modalias documentation (git-fixes).\n- mei: samples: fix a signedness bug in amt_host_if_call() (bsc#1051510).\n- mfd: intel-lpss: Add default I2C device properties for Gemini Lake (bsc#1051510).\n- mfd: max8997: Enale irq-wakeup unconditionally (bsc#1051510).\n- mfd: mc13xxx-core: Fix PMIC shutdown when reading ADC values (bsc#1051510).\n- mfd: palmas: Assign the right powerhold mask for tps65917 (git-fixes).\n- mfd: ti_am335x_tscadc: Keep ADC interface on if child is wakeup capable (bsc#1051510).\n- mISDN: Fix type of switch control variable in ctrl_teimanager (bsc#1051510).\n- missing escaping of backslashes in macro expansions Fixes: f3b74b0ae86b (\u0027rpm/kernel-subpackage-spec: Unify dependency handling.\u0027) Fixes: 3fd22e219f77 (\u0027rpm/kernel-subpackage-spec: Fix empty Recommends tag (bsc#1143959)\u0027)\n- mlx5: add parameter to disable enhanced IPoIB (bsc#1142095)\n- mm, memory_hotplug: do not clear numa_node association after hot_remove (bnc#1115026).\n- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d() (git fixes (mm/gup)).\n- mm/compaction.c: clear total_{migrate,free}_scanned before scanning a new zone (git fixes (mm/compaction)).\n- mm/debug.c: PageAnon() is true for PageKsm() pages (git fixes (mm/debug)).\n- mm/page-writeback.c: fix range_cyclic writeback vs writepages deadlock (bsc#1159394).\n- mm: memory_hotplug: use put_device() if device_register fail (bsc#1159955 ltc#182993).\n- mmc: core: fix wl1251 sdio quirks (git-fixes).\n- mmc: host: omap_hsmmc: add code for special init of wl1251 to get rid of pandora_wl1251_init_card (git-fixes).\n- mmc: mediatek: fix cannot receive new request when msdc_cmd_is_ready fail (bsc#1051510).\n- mmc: mediatek: fix CMD_TA to 2 for MT8173 HS200/HS400 mode (bsc#1051510).\n- mmc: sdhci-of-at91: fix quirk2 overwrite (git-fixes).\n- mmc: sdhci-of-esdhc: fix P2020 errata handling (bsc#1051510).\n- mmc: sdhci-of-esdhc: Revert \u0027mmc: sdhci-of-esdhc: add erratum A-009204 support\u0027 (bsc#1051510).\n- mmc: sdhci: fix minimum clock rate for v3 controller (bsc#1051510).\n- mmc: sdio: fix wl1251 vendor id (git-fixes).\n- mmc: tegra: fix SDR50 tuning override (bsc#1051510).\n- moduleparam: fix parameter description mismatch (bsc#1051510).\n- mt7601u: fix bbp version check in mt7601u_wait_bbp_ready (bsc#1051510).\n- mtd: spear_smi: Fix Write Burst mode (bsc#1051510).\n- mtd: spi-nor: fix silent truncation in spi_nor_read() (bsc#1051510).\n- mwifiex: debugfs: correct histogram spacing, formatting (bsc#1051510).\n- mwifiex: drop most magic numbers from mwifiex_process_tdls_action_frame() (git-fixes).\n- mwifiex: Fix NL80211_TX_POWER_LIMITED (bsc#1051510).\n- mwifiex: fix potential NULL dereference and use after free (bsc#1051510).\n- nbd: prevent memory leak (bsc#1158638).\n- net/ibmvnic: Fix typo in retry check (bsc#1155689 ltc#182047).\n- net/ibmvnic: Ignore H_FUNCTION return from H_EOI to tolerate XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/mlx4_core: Dynamically set guaranteed amount of counters per VF (networking-stable-19_11_05).\n- net/mlx4_en: fix mlx4 ethtool -N insertion (networking-stable-19_11_25).\n- net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq (bsc#1046303).\n- net/mlx5e: Fix handling of compressed CQEs in case of low NAPI budget (networking-stable-19_11_05).\n- net/mlx5e: Fix set vf link state error flow (networking-stable-19_11_25).\n- net/mlx5e: Fix SFF 8472 eeprom length (git-fixes).\n- net/mlxfw: Fix out-of-memory error in mfa2 flash burning (bsc#1051858).\n- net/sched: act_pedit: fix WARN() in the traffic path (networking-stable-19_11_25).\n- net/smc: avoid fallback in case of non-blocking connect (git-fixes).\n- net/smc: fix closing of fallback SMC sockets (git-fixes).\n- net/smc: Fix error path in smc_init (git-fixes).\n- net/smc: fix ethernet interface refcounting (git-fixes).\n- net/smc: fix refcounting for non-blocking connect() (git-fixes).\n- net/smc: keep vlan_id for SMC-R in smc_listen_work() (git-fixes).\n- net: add READ_ONCE() annotation in __skb_wait_for_more_packets() (networking-stable-19_11_05).\n- net: add skb_queue_empty_lockless() (networking-stable-19_11_05).\n- net: annotate accesses to sk-\u003esk_incoming_cpu (networking-stable-19_11_05).\n- net: annotate lockless accesses to sk-\u003esk_napi_id (networking-stable-19_11_05).\n- net: avoid potential infinite loop in tc_ctl_action() (networking-stable-19_10_24).\n- net: bcmgenet: Fix RGMII_MODE_EN value for GENET v1/2/3 (networking-stable-19_10_24).\n- net: bcmgenet: reset 40nm EPHY on energy detect (networking-stable-19_11_05).\n- net: bcmgenet: Set phydev-\u003edev_flags only for internal PHYs (networking-stable-19_10_24).\n- net: bridge: deny dev_set_mac_address() when unregistering (networking-stable-19_12_16).\n- net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size() (git-fixes).\n- net: dsa: b53: Do not clear existing mirrored port mask (networking-stable-19_11_05).\n- net: dsa: bcm_sf2: Fix IMP setup for port different than 8 (networking-stable-19_11_05).\n- net: dsa: fix switch tree list (networking-stable-19_11_05).\n- net: ethernet: ftgmac100: Fix DMA coherency issue with SW checksum (networking-stable-19_11_05).\n- net: ethernet: octeon_mgmt: Account for second possible VLAN header (networking-stable-19_11_10).\n- net: ethernet: ti: cpsw: fix extra rx interrupt (networking-stable-19_12_16).\n- net: fix data-race in neigh_event_send() (networking-stable-19_11_10).\n- net: fix sk_page_frag() recursion from memory reclaim (networking-stable-19_11_05).\n- net: hisilicon: Fix ping latency when deal with high throughput (networking-stable-19_11_05).\n- net: phy: at803x: Change error to EINVAL for invalid MAC (bsc#1051510).\n- net: phy: broadcom: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: Check against net_device being NULL (bsc#1051510).\n- net: phy: dp83867: Set up RGMII TX delay (bsc#1051510).\n- net: phy: Fix not to call phy_resume() if PHY is not attached (bsc#1051510).\n- net: phy: Fix the register offsets in Broadcom iProc mdio mux driver (bsc#1051510).\n- net: phy: fixed_phy: Fix fixed_phy not checking GPIO (bsc#1051510).\n- net: phy: marvell: clear wol event before setting it (bsc#1051510).\n- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: meson-gxl: check phy_write return value (bsc#1051510).\n- net: phy: micrel: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: mscc: read \u0027vsc8531, edge-slowdown\u0027 as an u32 (bsc#1051510).\n- net: phy: mscc: read \u0027vsc8531,vddmac\u0027 as an u32 (bsc#1051510).\n- net: phy: xgene: disable clk on error paths (bsc#1051510).\n- net: phy: xgmiitorgmii: Check phy_driver ready before accessing (bsc#1051510).\n- net: phy: xgmiitorgmii: Check read_status results (bsc#1051510).\n- net: phy: xgmiitorgmii: Support generic PHY status read (bsc#1051510).\n- net: psample: fix skb_over_panic (networking-stable-19_12_03).\n- net: rtnetlink: prevent underflows in do_setvfinfo() (networking-stable-19_11_25).\n- net: sched: fix `tc -s class show` no bstats on class with nolock subqueues (networking-stable-19_12_03).\n- net: stmmac: disable/enable ptp_ref_clk in suspend/resume flow (networking-stable-19_10_24).\n- net: usb: lan78xx: limit size of local TSO packets (bsc#1051510).\n- net: usb: qmi_wwan: add support for DW5821e with eSIM support (networking-stable-19_11_10).\n- net: usb: qmi_wwan: add support for Foxconn T77W968 LTE modules (networking-stable-19_11_18).\n- net: use skb_queue_empty_lockless() in busy poll contexts (networking-stable-19_11_05).\n- net: use skb_queue_empty_lockless() in poll() handlers (networking-stable-19_11_05).\n- net: wireless: ti: remove local VENDOR_ID and DEVICE_ID definitions (git-fixes).\n- net: wireless: ti: wl1251 use new SDIO_VENDOR_ID_TI_WL1251 definition (git-fixes).\n- net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol() (networking-stable-19_11_05).\n- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).\n- netns: fix GFP flags in rtnl_net_notifyid() (networking-stable-19_11_05).\n- nfc: fdp: fix incorrect free object (networking-stable-19_11_10).\n- nfc: netlink: fix double device reference drop (git-fixes).\n- nfc: nxp-nci: Fix NULL pointer dereference after I2C communication error (git-fixes).\n- nfc: pn533: fix bulk-message timeout (bsc#1051510).\n- nfc: pn544: Adjust indentation in pn544_hci_check_presence (git-fixes).\n- nfc: port100: handle command failure cleanly (git-fixes).\n- nfc: st21nfca: fix double free (networking-stable-19_11_10).\n- nl80211: Fix a GET_KEY reply attribute (bsc#1051510).\n- ocfs2: fix panic due to ocfs2_wq is null (bsc#1158644).\n- ocfs2: fix passing zero to \u0027PTR_ERR\u0027 warning (bsc#1158649).\n- openvswitch: drop unneeded BUG_ON() in ovs_flow_cmd_build_info() (networking-stable-19_12_03).\n- openvswitch: fix flow command message size (git-fixes).\n- openvswitch: remove another BUG_ON() (networking-stable-19_12_03).\n- openvswitch: support asymmetric conntrack (networking-stable-19_12_16).\n- orinoco_usb: fix interface sanity check (git-fixes).\n- padata: use smp_mb in padata_reorder to avoid orphaned padata jobs (git-fixes).\n- PCI/ACPI: Correct error message for ASPM disabling (bsc#1051510).\n- PCI/MSI: Fix incorrect MSI-X masking on resume (bsc#1051510).\n- PCI/MSI: Return -ENOSPC from pci_alloc_irq_vectors_affinity() (bsc#1051510).\n- PCI/PME: Fix possible use-after-free on remove (git-fixes).\n- PCI/PTM: Remove spurious \u0027d\u0027 from granularity message (bsc#1051510).\n- PCI: Apply Cavium ACS quirk to ThunderX2 and ThunderX3 (bsc#1051510).\n- PCI: dwc: Fix find_next_bit() usage (bsc#1051510).\n- PCI: Fix Intel ACS quirk UPDCR register address (bsc#1051510).\n- PCI: rcar: Fix missing MACCTLR register setting in initialization sequence (bsc#1051510).\n- PCI: sysfs: Ignore lockdep for remove attribute (git-fixes).\n- PCI: tegra: Enable Relaxed Ordering only for Tegra20 \u0026 Tegra30 (git-fixes).\n- phy: phy-twl4030-usb: fix denied runtime access (git-fixes).\n- pinctl: ti: iodelay: fix error checking on pinctrl_count_index_with_args call (git-fixes).\n- pinctrl: at91: do not use the same irqchip with multiple gpiochips (git-fixes).\n- pinctrl: cherryview: Allocate IRQ chip dynamic (git-fixes).\n- pinctrl: lewisburg: Update pin list according to v1.1v6 (bsc#1051510).\n- pinctrl: lpc18xx: Use define directive for PIN_CONFIG_GPIO_PIN_INT (bsc#1051510).\n- pinctrl: qcom: spmi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: qcom: ssbi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in init code (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in S3C24xx wakeup controller init (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in S3C64xx wakeup controller init (bsc#1051510).\n- pinctrl: sunxi: Fix a memory leak in \u0027sunxi_pinctrl_build_state()\u0027 (bsc#1051510).\n- pinctrl: xway: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: zynq: Use define directive for PIN_CONFIG_IO_STANDARD (bsc#1051510).\n- pktcdvd: remove warning on attempting to register non-passthrough dev (bsc#1051510).\n- platform/x86: asus-wmi: Fix keyboard brightness cannot be set to 0 (bsc#1051510).\n- platform/x86: hp-wmi: Fix ACPI errors caused by passing 0 as input size (bsc#1051510).\n- platform/x86: hp-wmi: Fix ACPI errors caused by too small buffer (bsc#1051510).\n- platform/x86: hp-wmi: Make buffer for HPWMI_FEATURE2_QUERY 128 bytes (bsc#1051510).\n- platform/x86: pmc_atom: Add Siemens CONNECT X300 to critclk_systems DMI table (bsc#1051510).\n- PM / AVS: SmartReflex: NULL check before some freeing functions is not needed (bsc#1051510).\n- PM / devfreq: Check NULL governor in available_governors_show (git-fixes).\n- PM / devfreq: exynos-bus: Correct clock enable sequence (bsc#1051510).\n- PM / devfreq: Lock devfreq in trans_stat_show (git-fixes).\n- PM / devfreq: passive: fix compiler warning (bsc#1051510).\n- PM / devfreq: passive: Use non-devm notifiers (bsc#1051510).\n- PM / Domains: Deal with multiple states but no governor in genpd (bsc#1051510).\n- PM / hibernate: Check the success of generating md5 digest before hibernation (bsc#1051510).\n- power: reset: at91-poweroff: do not procede if at91_shdwc is allocated (bsc#1051510).\n- power: supply: ab8500_fg: silence uninitialized variable warnings (bsc#1051510).\n- power: supply: twl4030_charger: disable eoc interrupt on linear charge (bsc#1051510).\n- power: supply: twl4030_charger: fix charging current out-of-bounds (bsc#1051510).\n- powerpc/archrandom: fix arch_get_random_seed_int() (bsc#1065729).\n- powerpc/book3s64/hash: Use secondary hash for bolted mapping if the primary is full (bsc#1157778 ltc#182520).\n- powerpc/bpf: Fix tail call implementation (bsc#1157698).\n- powerpc/irq: fix stack overflow verification (bsc#1065729).\n- powerpc/livepatch: return -ERRNO values in save_stack_trace_tsk_reliable() (bsc#1071995 bsc#1161875).\n- powerpc/mm: drop #ifdef CONFIG_MMU in is_ioremap_addr() (bsc#1065729).\n- powerpc/pkeys: remove unused pkey_allows_readwrite (bsc#1065729).\n- powerpc/powernv: Disable native PCIe port management (bsc#1065729).\n- powerpc/pseries/lparcfg: Fix display of Maximum Memory (bsc#1162028 ltc#181740).\n- powerpc/pseries/mobility: notify network peers after migration (bsc#1152631 ltc#181798).\n- powerpc/pseries: Do not fail hash page table insert for bolted mapping (bsc#1157778 ltc#182520).\n- powerpc/pseries: Do not opencode HPTE_V_BOLTED (bsc#1157778 ltc#182520).\n- powerpc/pseries: Drop pointless static qualifier in vpa_debugfs_init() (git-fixes).\n- powerpc/security: Fix debugfs data leak on 32-bit (bsc#1065729).\n- powerpc/tools: Do not quote $objdump in scripts (bsc#1065729).\n- powerpc/xive: Discard ESB load value when interrupt is invalid (bsc#1085030).\n- powerpc/xive: Skip ioremap() of ESB pages for LSI interrupts (bsc#1085030).\n- powerpc: Allow 64bit VDSO __kernel_sync_dicache to work across ranges \u003e4GB (bnc#1151927 5.3.17).\n- powerpc: Allow flush_icache_range to work across ranges \u003e4GB (bnc#1151927 5.3.17).\n- powerpc: Fix vDSO clock_getres() (bsc#1065729).\n- ppdev: fix PPGETTIME/PPSETTIME ioctls (bsc#1051510).\n- ppp: Adjust indentation into ppp_async_input (git-fixes).\n- prevent active file list thrashing due to refault detection (VM Performance, bsc#1156286).\n- printk: Export console_printk (bsc#1071995).\n- pwm: bcm-iproc: Prevent unloading the driver module while in use (git-fixes).\n- pwm: Clear chip_data in pwm_put() (bsc#1051510).\n- pwm: clps711x: Fix period calculation (bsc#1051510).\n- pwm: lpss: Only set update bit if we are actually changing the settings (bsc#1051510).\n- qede: Disable hardware gro when xdp prog is installed (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qede: fix NULL pointer deref in __qede_remove() (networking-stable-19_11_10).\n- r8152: add device id for Lenovo ThinkPad USB-C Dock Gen 2 (networking-stable-19_11_05).\n- r8152: add missing endpoint sanity check (bsc#1051510).\n- random: move FIPS continuous test to output functions (bsc#1155334).\n- RDMA/bnxt_re: Avoid freeing MR resources if dereg fails (bsc#1050244).\n- RDMA/hns: Prevent memory leaks of eq-\u003ebuf_list (bsc#1104427 ).\n- README.BRANCH: removing myself from the maintainer list\n- regulator: ab8500: Remove AB8505 USB regulator (bsc#1051510).\n- regulator: ab8500: Remove SYSCLKREQ from enum ab8505_regulator_id (bsc#1051510).\n- regulator: rn5t618: fix module aliases (bsc#1051510).\n- regulator: tps65910: fix a missing check of return value (bsc#1051510).\n- remoteproc: Check for NULL firmwares in sysfs interface (git-fixes).\n- reset: fix of_reset_simple_xlate kerneldoc comment (bsc#1051510).\n- reset: Fix potential use-after-free in __of_reset_control_get() (bsc#1051510).\n- reset: fix reset_control_get_exclusive kerneldoc comment (bsc#1051510).\n- reset: fix reset_control_ops kerneldoc comment (bsc#1051510).\n- resource: fix locking in find_next_iomem_res() (bsc#1114279).\n- Revert \u0027ath10k: fix DMA related firmware crashes on multiple devices\u0027 (git-fixes).\n- Revert \u0027Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers\u0027 (bsc#1051510).\n- Revert \u0027mmc: sdhci: Fix incorrect switch to HS mode\u0027 (bsc#1051510).\n- rpm/kernel-binary.spec.in: add COMPRESS_VMLINUX (bnc#1155921) Let COMPRESS_VMLINUX determine the compression used for vmlinux. By default (historically), it is gz.\n- rpm/kernel-source.spec.in: Fix dependency of kernel-devel (bsc#1154043)\n- rpm/kernel-subpackage-spec: Exclude kernel-firmware recommends (bsc#1143959) For reducing the dependency on kernel-firmware in sub packages\n- rpm/kernel-subpackage-spec: Fix empty Recommends tag (bsc#1143959)\n- rpm/kernel-subpackage-spec: fix kernel-default-base build There were some issues with recent changes to subpackage dependencies handling:\n- rpm/kernel-subpackage-spec: Unify dependency handling.\n- rpm/modules.fips: update module list (bsc#1157853)\n- rsi_91x_usb: fix interface sanity check (git-fixes).\n- rt2800: remove errornous duplicate condition (git-fixes).\n- rtc: dt-binding: abx80x: fix resistance scale (bsc#1051510).\n- rtc: max8997: Fix the returned value in case of error in \u0027max8997_rtc_read_alarm()\u0027 (bsc#1051510).\n- rtc: msm6242: Fix reading of 10-hour digit (bsc#1051510).\n- rtc: pcf8523: set xtal load capacitance from DT (bsc#1051510).\n- rtc: s35390a: Change buf\u0027s type to u8 in s35390a_init (bsc#1051510).\n- rtl8187: Fix warning generated when strncpy() destination length matches the sixe argument (bsc#1051510).\n- rtl818x: fix potential use after free (bsc#1051510).\n- rtl8xxxu: fix interface sanity check (git-fixes).\n- rtlwifi: Remove unnecessary NULL check in rtl_regd_init (bsc#1051510).\n- rtlwifi: rtl8192de: Fix misleading REG_MCUFWDL information (bsc#1051510).\n- rtlwifi: rtl8192de: Fix missing code to retrieve RX buffer address (bsc#1051510).\n- rtlwifi: rtl8192de: Fix missing enable interrupt flag (bsc#1051510).\n- s390/bpf: fix lcgr instruction encoding (bsc#1051510).\n- s390/bpf: use 32-bit index for tail calls (bsc#1051510).\n- s390/cio: avoid calling strlen on null pointer (bsc#1051510).\n- s390/cio: exclude subchannels with no parent from pseudo check (bsc#1051510).\n- s390/cmm: fix information leak in cmm_timeout_handler() (bsc#1051510).\n- s390/ftrace: generate traced function stack frame (jsc#SLE-11178 jsc#SLE-11179).\n- s390/ftrace: save traced function caller (jsc#SLE-11179).\n- s390/ftrace: use HAVE_FUNCTION_GRAPH_RET_ADDR_PTR (jsc#SLE-11179).\n- s390/head64: correct init_task stack setup (jsc#SLE-11179).\n- s390/idle: fix cpu idle time calculation (bsc#1051510).\n- s390/kasan: avoid false positives during stack unwind (jsc#SLE-11179).\n- s390/kasan: avoid report in get_wchan (jsc#SLE-11179).\n- s390/livepatch: Implement reliable stack tracing for the consistency model (jsc#SLE-11179).\n- s390/mm: properly clear _PAGE_NOEXEC bit when it is not supported (bsc#1051510).\n- s390/process: avoid custom stack unwinding in get_wchan (jsc#SLE-11179).\n- s390/process: avoid potential reading of freed stack (bsc#1051510).\n- s390/qdio: (re-)initialize tiqdio list entries (bsc#1051510).\n- s390/qdio: do not touch the dsci in tiqdio_add_input_queues() (bsc#1051510).\n- s390/qeth: clean up page frag creation (git-fixes).\n- s390/qeth: consolidate skb allocation (git-fixes).\n- s390/qeth: ensure linear access to packet headers (git-fixes).\n- s390/qeth: guard against runt packets (git-fixes).\n- s390/qeth: return proper errno on IO error (bsc#1051510).\n- s390/setup: fix boot crash for machine without EDAT-1 (bsc#1051510 bsc#1140948).\n- s390/setup: fix early warning messages (bsc#1051510 bsc#1140948).\n- s390/stacktrace: use common arch_stack_walk infrastructure (jsc#SLE-11179).\n- s390/suspend: fix stack setup in swsusp_arch_suspend (jsc#SLE-11179).\n- s390/test_unwind: print verbose unwinding results (jsc#SLE-11179).\n- s390/topology: avoid firing events before kobjs are created (bsc#1051510).\n- s390/unwind: add stack pointer alignment sanity checks (jsc#SLE-11179).\n- s390/unwind: always inline get_stack_pointer (jsc#SLE-11179).\n- s390/unwind: avoid int overflow in outside_of_stack (jsc#SLE-11179).\n- s390/unwind: cleanup unused READ_ONCE_TASK_STACK (jsc#SLE-11179).\n- s390/unwind: correct stack switching during unwind (jsc#SLE-11179).\n- s390/unwind: drop unnecessary code around calling ftrace_graph_ret_addr() (jsc#SLE-11179).\n- s390/unwind: filter out unreliable bogus %r14 (jsc#SLE-11179).\n- s390/unwind: fix get_stack_pointer(NULL, NULL) (jsc#SLE-11179).\n- s390/unwind: fix mixing regs and sp (jsc#SLE-11179).\n- s390/unwind: introduce stack unwind API (jsc#SLE-11179).\n- s390/unwind: make reuse_sp default when unwinding pt_regs (jsc#SLE-11179).\n- s390/unwind: remove stack recursion warning (jsc#SLE-11179).\n- s390/unwind: report an error if pt_regs are not on stack (jsc#SLE-11179).\n- s390/unwind: start unwinding from reliable state (jsc#SLE-11179).\n- s390/unwind: stop gracefully at task pt_regs (jsc#SLE-11179).\n- s390/unwind: stop gracefully at user mode pt_regs in irq stack (jsc#SLE-11179).\n- s390/unwind: unify task is current checks (jsc#SLE-11179).\n- s390: add stack switch helper (jsc#SLE-11179).\n- s390: add support for virtually mapped kernel stacks (jsc#SLE-11179).\n- s390: always inline current_stack_pointer() (jsc#SLE-11179).\n- s390: always inline disabled_wait (jsc#SLE-11179).\n- s390: avoid misusing CALL_ON_STACK for task stack setup (jsc#SLE-11179).\n- s390: clean up stacks setup (jsc#SLE-11179).\n- s390: correct CALL_ON_STACK back_chain saving (jsc#SLE-11179).\n- s390: disable preemption when switching to nodat stack with CALL_ON_STACK (jsc#SLE-11179).\n- s390: fine-tune stack switch helper (jsc#SLE-11179).\n- s390: fix register clobbering in CALL_ON_STACK (jsc#SLE-11179).\n- s390: fix stfle zero padding (bsc#1051510).\n- s390: kabi workaround for ftrace_ret_stack (jsc#SLE-11179).\n- s390: kabi workaround for lowcore changes due to vmap stack (jsc#SLE-11179).\n- s390: kabi workaround for reliable stack tracing (jsc#SLE-11179).\n- s390: preserve kabi for stack unwind API (jsc#SLE-11179).\n- s390: unify stack size definitions (jsc#SLE-11179).\n- sched/fair: Add tmp_alone_branch assertion (bnc#1156462).\n- sched/fair: Fix insertion in rq-\u003eleaf_cfs_rq_list (bnc#1156462).\n- sched/fair: Fix O(nr_cgroups) in the load balancing path (bnc#1156462).\n- sched/fair: Optimize update_blocked_averages() (bnc#1156462).\n- sched/fair: WARN() and refuse to set buddy when !se-\u003eon_rq (bsc#1158132).\n- scsi: lpfc: Fix Oops in nvme_register with target logout/login (bsc#1151900).\n- scsi: qla2xxx: Add a shadow variable to hold disc_state history of fcport (bsc#1158013).\n- scsi: qla2xxx: Add D-Port Diagnostic reason explanation logs (bsc#1158013).\n- scsi: qla2xxx: Add debug dump of LOGO payload and ELS IOCB (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Added support for MPI and PEP regions for ISP28XX (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Allow PLOGI in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Change discovery state before PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Cleanup unused async_logout_done (bsc#1158013).\n- scsi: qla2xxx: Configure local loop for N2N target (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Consolidate fabric scan (bsc#1158013).\n- scsi: qla2xxx: Correct fcport flags handling (bsc#1158013).\n- scsi: qla2xxx: Correctly retrieve and interpret active flash region (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Do not call qlt_async_event twice (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Do not defer relogin unconditonally (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Drop superfluous INIT_WORK of del_work (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Fix fabric scan hang (bsc#1158013).\n- scsi: qla2xxx: Fix incorrect SFUB length used for Secure Flash Update MB Cmd (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Fix mtcp dump collection failure (bsc#1158013).\n- scsi: qla2xxx: Fix PLOGI payload and ELS IOCB dump length (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Fix qla2x00_request_irqs() for MSI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Fix RIDA Format-2 (bsc#1158013).\n- scsi: qla2xxx: fix rports not being mark as lost in sync fabric scan (bsc#1138039).\n- scsi: qla2xxx: Fix stuck login session using prli_pend_timer (bsc#1158013).\n- scsi: qla2xxx: Fix stuck session in GNL (bsc#1158013).\n- scsi: qla2xxx: Fix the endianness of the qla82xx_get_fw_size() return type (bsc#1158013).\n- scsi: qla2xxx: Fix update_fcport for current_topology (bsc#1158013).\n- scsi: qla2xxx: Ignore NULL pointer in tcm_qla2xxx_free_mcmd (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Ignore PORT UPDATE after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Improve readability of the code that handles qla_flt_header (bsc#1158013).\n- scsi: qla2xxx: Initialize free_work before flushing it (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Remove defer flag to indicate immeadiate port loss (bsc#1158013).\n- scsi: qla2xxx: Send Notify ACK after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: unregister ports after GPN_FT failure (bsc#1138039).\n- scsi: qla2xxx: Update driver version to 10.01.00.22-k (bsc#1158013).\n- scsi: qla2xxx: Use common routine to free fcport struct (bsc#1158013).\n- scsi: qla2xxx: Use explicit LOGO in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Use get_unaligned_*() instead of open-coding these functions (bsc#1158013).\n- scsi: zfcp: fix request object use-after-free in send path causing wrong traces (bsc#1051510).\n- scsi: zfcp: trace channel log even for FCP command responses (git-fixes).\n- sctp: cache netns in sctp_ep_common (networking-stable-19_12_03).\n- sctp: change sctp_prot .no_autobind with true (networking-stable-19_10_24).\n- selftests: net: reuseport_dualstack: fix uninitalized parameter (networking-stable-19_11_05).\n- serial: max310x: Fix tx_empty() callback (bsc#1051510).\n- serial: mxs-auart: Fix potential infinite loop (bsc#1051510).\n- serial: samsung: Enable baud clock for UART reset procedure in resume (bsc#1051510).\n- serial: uartps: Fix suspend functionality (bsc#1051510).\n- sfc: Only cancel the PPS workqueue if it exists (networking-stable-19_11_25).\n- signal: Properly set TRACE_SIGNAL_LOSE_INFO in __send_signal (bsc#1157463).\n- slcan: Fix memory leak in error path (bsc#1051510).\n- slip: Fix memory leak in slip_open error path (bsc#1051510).\n- slip: Fix use-after-free Read in slip_open (bsc#1051510).\n- smb3: Fix crash in SMB2_open_init due to uninitialized field in compounding path (bsc#1144333).\n- smb3: fix leak in \u0027open on server\u0027 perf counter (bsc#1144333, bsc#1154355).\n- smb3: Fix persistent handles reconnect (bsc#1144333).\n- smb3: fix refcount underflow warning on unmount when no directory leases (bsc#1144333).\n- smb3: fix signing verification of large reads (bsc#1144333, bsc#1154355).\n- smb3: fix unmount hang in open_shroot (bsc#1144333, bsc#1154355).\n- smb3: improve handling of share deleted (and share recreated) (bsc#1144333, bsc#1154355).\n- smb3: Incorrect size for netname negotiate context (bsc#1144333, bsc#1154355).\n- smb3: remove confusing dmesg when mounting with encryption (\u0027seal\u0027) (bsc#1144333).\n- soc: imx: gpc: fix PDN delay (bsc#1051510).\n- soc: qcom: wcnss_ctrl: Avoid string overflow (bsc#1051510).\n- spi: atmel: Fix CS high support (bsc#1051510).\n- spi: atmel: fix handling of cs_change set on non-last xfer (bsc#1051510).\n- spi: fsl-lpspi: Prevent FIFO under/overrun by default (bsc#1051510).\n- spi: mediatek: Do not modify spi_transfer when transfer (bsc#1051510).\n- spi: mediatek: use correct mata-\u003exfer_len when in fifo transfer (bsc#1051510).\n- spi: omap2-mcspi: Fix DMA and FIFO event trigger size mismatch (bsc#1051510).\n- spi: omap2-mcspi: Set FIFO DMA trigger level to word length (bsc#1051510).\n- spi: pic32: Use proper enum in dmaengine_prep_slave_rg (bsc#1051510).\n- spi: rockchip: initialize dma_slave_config properly (bsc#1051510).\n- spi: spidev: Fix OF tree warning logic (bsc#1051510).\n- stacktrace: Do not skip first entry on noncurrent tasks (jsc#SLE-11179).\n- stacktrace: Force USER_DS for stack_trace_save_user() (jsc#SLE-11179).\n- stacktrace: Get rid of unneeded \u0027!!\u0027 pattern (jsc#SLE-11179).\n- stacktrace: Provide common infrastructure (jsc#SLE-11179).\n- stacktrace: Provide helpers for common stack trace operations (jsc#SLE-11179).\n- stacktrace: Unbreak stack_trace_save_tsk_reliable() (jsc#SLE-11179).\n- stacktrace: Use PF_KTHREAD to check for kernel threads (jsc#SLE-11179).\n- staging: comedi: adv_pci1710: fix AI channels 16-31 for PCI-1713 (bsc#1051510).\n- staging: iio: adt7316: Fix i2c data reading, set the data field (bsc#1051510).\n- staging: rtl8188eu: fix interface sanity check (bsc#1051510).\n- staging: rtl8192e: fix potential use after free (bsc#1051510).\n- staging: rtl8723bs: Add 024c:0525 to the list of SDIO device-ids (bsc#1051510).\n- staging: rtl8723bs: Drop ACPI device ids (bsc#1051510).\n- stm class: Fix a double free of stm_source_device (bsc#1051510).\n- supported.conf:\n- synclink_gt(): fix compat_ioctl() (bsc#1051510).\n- tcp: clear tp-\u003epackets_out when purging write queue (bsc#1160560).\n- tcp: exit if nothing to retransmit on RTO timeout (bsc#1160560, stable 4.14.159).\n- tcp: md5: fix potential overestimation of TCP option space (networking-stable-19_12_16).\n- tcp_nv: fix potential integer overflow in tcpnv_acked (bsc#1051510).\n- thermal: Fix deadlock in thermal thermal_zone_device_check (bsc#1051510).\n- thunderbolt: Fix lockdep circular locking depedency warning (git-fixes).\n- tipc: Avoid copying bytes beyond the supplied data (bsc#1051510).\n- tipc: check bearer name with right length in tipc_nl_compat_bearer_enable (bsc#1051510).\n- tipc: check link name with right length in tipc_nl_compat_link_set (bsc#1051510).\n- tipc: check msg-\u003ereq data len in tipc_nl_compat_bearer_disable (bsc#1051510).\n- tipc: compat: allow tipc commands without arguments (bsc#1051510).\n- tipc: fix a missing check of genlmsg_put (bsc#1051510).\n- tipc: fix link name length check (bsc#1051510).\n- tipc: fix memory leak in tipc_nl_compat_publ_dump (bsc#1051510).\n- tipc: fix skb may be leaky in tipc_link_input (bsc#1051510).\n- tipc: fix tipc_mon_delete() oops in tipc_enable_bearer() error path (bsc#1051510).\n- tipc: fix wrong timeout input for tipc_wait_for_cond() (bsc#1051510).\n- tipc: handle the err returned from cmd header function (bsc#1051510).\n- tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb (bsc#1051510).\n- tipc: tipc clang warning (bsc#1051510).\n- tpm: add check after commands attribs tab allocation (bsc#1051510).\n- tracing: Cleanup stack trace code (jsc#SLE-11179).\n- tracing: Have the histogram compare functions convert to u64 first (bsc#1160210).\n- tracing: xen: Ordered comparison of function pointers (git-fixes).\n- tty: serial: fsl_lpuart: use the sg count from dma_map_sg (bsc#1051510).\n- tty: serial: imx: use the sg count from dma_map_sg (bsc#1051510).\n- tty: serial: msm_serial: Fix flow control (bsc#1051510).\n- tty: serial: pch_uart: correct usage of dma_unmap_sg (bsc#1051510).\n- uaccess: Add non-pagefault user-space write function (bsc#1083647).\n- ubifs: Correctly initialize c-\u003emin_log_bytes (bsc#1158641).\n- ubifs: Limit the number of pages in shrink_liability (bsc#1158643).\n- udp: use skb_queue_empty_lockless() (networking-stable-19_11_05).\n- usb-serial: cp201x: support Mark-10 digital force gauge (bsc#1051510).\n- usb: adutux: fix interface sanity check (bsc#1051510).\n- usb: Allow USB device to be warm reset in suspended state (bsc#1051510).\n- usb: atm: ueagle-atm: add missing endpoint check (bsc#1051510).\n- usb: chaoskey: fix error case of a timeout (git-fixes).\n- usb: chipidea: Fix otg event handler (bsc#1051510).\n- usb: chipidea: host: Disable port power only if previously enabled (bsc#1051510).\n- usb: chipidea: imx: enable OTG overcurrent in case USB subsystem is already started (bsc#1051510).\n- usb: core: hub: Improved device recognition on remote wakeup (bsc#1051510).\n- usb: core: urb: fix URB structure initialization function (bsc#1051510).\n- usb: documentation: flags on usb-storage versus UAS (bsc#1051510).\n- usb: dwc3: debugfs: Properly print/set link state for HS (bsc#1051510).\n- usb: dwc3: do not log probe deferrals; but do log other error codes (bsc#1051510).\n- usb: dwc3: ep0: Clear started flag on completion (bsc#1051510).\n- usb: dwc3: gadget: Check ENBLSLPM before sending ep command (bsc#1051510).\n- usb: gadget: pch_udc: fix use after free (bsc#1051510).\n- usb: gadget: udc: fotg210-udc: Fix a sleep-in-atomic-context bug in fotg210_get_status() (bsc#1051510).\n- usb: gadget: uvc: configfs: Drop leaked references to config items (bsc#1051510).\n- usb: gadget: uvc: configfs: Prevent format changes after linking header (bsc#1051510).\n- usb: gadget: uvc: Factor out video USB request queueing (bsc#1051510).\n- usb: gadget: uvc: Only halt video streaming endpoint in bulk mode (bsc#1051510).\n- usb: gadget: u_serial: add missing port entry locking (bsc#1051510).\n- usb: idmouse: fix interface sanity checks (bsc#1051510).\n- usb: misc: appledisplay: fix backlight update_status return code (bsc#1051510).\n- usb: mon: Fix a deadlock in usbmon between mmap and read (bsc#1051510).\n- usb: mtu3: fix dbginfo in qmu_tx_zlp_error_handler (bsc#1051510).\n- usb: musb: dma: Correct parameter passed to IRQ handler (bsc#1051510).\n- usb: musb: fix idling for suspend after disconnect interrupt (bsc#1051510).\n- usb: serial: ch341: handle unbound port at reset_resume (bsc#1051510).\n- usb: serial: ftdi_sio: add device IDs for U-Blox C099-F9P (bsc#1051510).\n- usb: serial: io_edgeport: add missing active-port sanity check (bsc#1051510).\n- usb: serial: io_edgeport: fix epic endpoint lookup (bsc#1051510).\n- usb: serial: io_edgeport: handle unbound ports on URB completion (bsc#1051510).\n- usb: serial: io_edgeport: use irqsave() in USB\u0027s complete callback (bsc#1051510).\n- usb: serial: keyspan: handle unbound ports (bsc#1051510).\n- usb: serial: mos7720: fix remote wakeup (git-fixes).\n- usb: serial: mos7840: add USB ID to support Moxa UPort 2210 (bsc#1051510).\n- usb: serial: mos7840: fix remote wakeup (git-fixes).\n- usb: serial: opticon: fix control-message timeouts (bsc#1051510).\n- usb: serial: option: add support for DW5821e with eSIM support (bsc#1051510).\n- usb: serial: option: add support for Foxconn T77W968 LTE modules (bsc#1051510).\n- usb: serial: option: Add support for Quectel RM500Q (bsc#1051510).\n- usb: serial: quatech2: handle unbound ports (bsc#1051510).\n- usb: serial: simple: Add Motorola Solutions TETRA MTP3xxx and MTP85xx (bsc#1051510).\n- usb: serial: suppress driver bind attributes (bsc#1051510).\n- usb: uas: heed CAPACITY_HEURISTICS (bsc#1051510).\n- usb: uas: honor flag to avoid CAPACITY16 (bsc#1051510).\n- usb: xhci-mtk: fix ISOC error when interval is zero (bsc#1051510).\n- usb: xhci: Fix build warning seen with CONFIG_PM=n (bsc#1051510).\n- usb: xhci: only set D3hot for pci device (bsc#1051510).\n- usbip: Fix receive error in vhci-hcd when using scatter-gather (bsc#1051510).\n- usbip: tools: fix fd leakage in the function of read_attr_usbip_status (git-fixes).\n- vfio-ccw: Fix misleading comment when setting orb.cmd.c64 (bsc#1051510).\n- vfio-ccw: Set pa_nr to 0 if memory allocation fails for pa_iova_pfn (bsc#1051510).\n- vfio: ccw: push down unsupported IDA check (bsc#1156471 LTC#182362).\n- vfs: fix preadv64v2 and pwritev64v2 compat syscalls with offset == -1 (bsc#1051510).\n- video/hdmi: Fix AVI bar unpack (git-fixes).\n- video: backlight: Add devres versions of of_find_backlight (bsc#1090888) Taken for 6010831dde5.\n- video: backlight: Add of_find_backlight helper in backlight.c (bsc#1090888) Taken for 6010831dde5.\n- virtio/s390: fix race on airq_areas (bsc#1051510).\n- virtio_console: allocate inbufs in add_port() only if it is needed (git-fixes).\n- virtio_ring: fix return code on DMA mapping fails (git-fixes).\n- vmxnet3: turn off lro when rxcsum is disabled (bsc#1157499).\n- vsock/virtio: fix sock refcnt holding during the shutdown (git-fixes).\n- watchdog: meson: Fix the wrong value of left time (bsc#1051510).\n- watchdog: sama5d4: fix WDD value to be always set to max (bsc#1051510).\n- workqueue: Fix pwq ref leak in rescuer_thread() (bsc#1160211).\n- x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).\n- x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).\n- x86/kgbd: Use NMI_VECTOR not APIC_DM_NMI (bsc#1114279).\n- x86/mce/AMD: Allow any CPU to initialize the smca_banks array (bsc#1114279).\n- x86/MCE/AMD: Allow Reserved types to be overwritten in smca_banks (bsc#1114279).\n- x86/MCE/AMD: Do not use rdmsr_safe_on_cpu() in smca_configure() (bsc#1114279).\n- x86/mce: Fix possibly incorrect severity calculation on AMD (bsc#1114279).\n- x86/mm/pkeys: Fix typo in Documentation/x86/protection-keys.txt (bsc#1078248).\n- x86/pkeys: Update documentation about availability (bsc#1078248).\n- x86/resctrl: Fix an imbalance in domain_remove_cpu() (bsc#1114279).\n- x86/resctrl: Fix potential lockdep warning (bsc#1114279).\n- x86/resctrl: Fix potential memory leak (bsc#1114279).\n- x86/resctrl: Prevent NULL pointer dereference when reading mondata (bsc#1114279).\n- x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs (bsc#1158068).\n- x86/speculation: Fix incorrect MDS/TAA mitigation status (bsc#1114279).\n- x86/speculation: Fix redundant MDS mitigation message (bsc#1114279).\n- xen-blkfront: switch kcalloc to kvcalloc for large array allocation (bsc#1160917).\n- xen/blkback: Avoid unmapping unmapped grant pages (bsc#1065600).\n- xen/blkfront: Adjust indentation in xlvbd_alloc_gendisk (bsc#1065600).\n- xfrm: Fix transport mode skb control buffer usage (bsc#1161552).\n- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1161087, bsc#1153917).\n- xfs: Sanity check flags of Q_XQUOTARM call (bsc#1158652).\n- xhci: handle some XHCI_TRUST_TX_LENGTH quirks cases as default behaviour (bsc#1051510).\n- xhci: Increase STS_HALT timeout in xhci_suspend() (bsc#1051510).\n- zd1211rw: fix storage endpoint lookup (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-599,SUSE-SLE-RT-12-SP4-2020-599", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_0599-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:0599-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200599-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:0599-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" }, { "category": "self", "summary": "SUSE Bug 1046303", "url": "https://bugzilla.suse.com/1046303" }, { "category": "self", "summary": "SUSE Bug 1050244", "url": "https://bugzilla.suse.com/1050244" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1051858", "url": "https://bugzilla.suse.com/1051858" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1078248", "url": "https://bugzilla.suse.com/1078248" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1086301", "url": "https://bugzilla.suse.com/1086301" }, { "category": "self", "summary": "SUSE Bug 1086313", "url": "https://bugzilla.suse.com/1086313" }, { "category": "self", "summary": "SUSE Bug 1086314", "url": "https://bugzilla.suse.com/1086314" }, { "category": "self", "summary": "SUSE Bug 1089644", "url": "https://bugzilla.suse.com/1089644" }, { "category": "self", "summary": "SUSE Bug 1090888", "url": "https://bugzilla.suse.com/1090888" }, { "category": "self", "summary": "SUSE Bug 1104427", "url": "https://bugzilla.suse.com/1104427" }, { "category": "self", "summary": "SUSE Bug 1108043", "url": "https://bugzilla.suse.com/1108043" }, { "category": "self", "summary": "SUSE Bug 1113722", "url": "https://bugzilla.suse.com/1113722" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1115026", "url": "https://bugzilla.suse.com/1115026" }, { "category": "self", "summary": "SUSE Bug 1117169", "url": "https://bugzilla.suse.com/1117169" }, { "category": "self", "summary": "SUSE Bug 1120853", "url": "https://bugzilla.suse.com/1120853" }, { "category": "self", "summary": "SUSE Bug 1127371", "url": "https://bugzilla.suse.com/1127371" }, { "category": "self", "summary": "SUSE Bug 1134973", "url": "https://bugzilla.suse.com/1134973" }, { "category": "self", "summary": "SUSE Bug 1138039", "url": "https://bugzilla.suse.com/1138039" }, { "category": "self", "summary": "SUSE Bug 1140948", "url": "https://bugzilla.suse.com/1140948" }, { "category": "self", "summary": "SUSE Bug 1141054", "url": "https://bugzilla.suse.com/1141054" }, { "category": "self", "summary": "SUSE Bug 1142095", "url": "https://bugzilla.suse.com/1142095" }, { "category": "self", "summary": "SUSE Bug 1143959", "url": "https://bugzilla.suse.com/1143959" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1146519", "url": "https://bugzilla.suse.com/1146519" }, { "category": "self", "summary": "SUSE Bug 1146544", "url": "https://bugzilla.suse.com/1146544" }, { "category": "self", "summary": "SUSE Bug 1151548", "url": "https://bugzilla.suse.com/1151548" }, { "category": "self", "summary": "SUSE Bug 1151900", "url": "https://bugzilla.suse.com/1151900" }, { "category": "self", "summary": "SUSE Bug 1151910", "url": "https://bugzilla.suse.com/1151910" }, { "category": "self", "summary": "SUSE Bug 1151927", "url": "https://bugzilla.suse.com/1151927" }, { "category": "self", "summary": "SUSE Bug 1152631", "url": "https://bugzilla.suse.com/1152631" }, { "category": "self", "summary": "SUSE Bug 1153811", "url": "https://bugzilla.suse.com/1153811" }, { "category": "self", "summary": "SUSE Bug 1153917", "url": "https://bugzilla.suse.com/1153917" }, { "category": "self", "summary": "SUSE Bug 1154043", "url": "https://bugzilla.suse.com/1154043" }, { "category": "self", "summary": "SUSE Bug 1154058", "url": "https://bugzilla.suse.com/1154058" }, { "category": "self", "summary": "SUSE Bug 1154355", "url": "https://bugzilla.suse.com/1154355" }, { "category": "self", "summary": "SUSE Bug 1155331", "url": "https://bugzilla.suse.com/1155331" }, { "category": "self", "summary": "SUSE Bug 1155334", "url": "https://bugzilla.suse.com/1155334" }, { "category": "self", "summary": "SUSE Bug 1155689", "url": "https://bugzilla.suse.com/1155689" }, { "category": "self", "summary": "SUSE Bug 1155897", "url": "https://bugzilla.suse.com/1155897" }, { "category": "self", "summary": "SUSE Bug 1155921", "url": "https://bugzilla.suse.com/1155921" }, { "category": "self", "summary": "SUSE Bug 1156258", "url": "https://bugzilla.suse.com/1156258" }, { "category": "self", "summary": "SUSE Bug 1156259", "url": "https://bugzilla.suse.com/1156259" }, { "category": "self", "summary": "SUSE Bug 1156286", "url": "https://bugzilla.suse.com/1156286" }, { "category": "self", "summary": "SUSE Bug 1156462", "url": "https://bugzilla.suse.com/1156462" }, { "category": "self", "summary": "SUSE Bug 1156471", "url": "https://bugzilla.suse.com/1156471" }, { "category": "self", "summary": "SUSE Bug 1157038", "url": "https://bugzilla.suse.com/1157038" }, { "category": "self", "summary": "SUSE Bug 1157042", "url": "https://bugzilla.suse.com/1157042" }, { "category": "self", "summary": "SUSE Bug 1157070", "url": "https://bugzilla.suse.com/1157070" }, { "category": "self", "summary": "SUSE Bug 1157143", "url": "https://bugzilla.suse.com/1157143" }, { "category": "self", "summary": "SUSE Bug 1157145", "url": "https://bugzilla.suse.com/1157145" }, { "category": "self", "summary": "SUSE Bug 1157155", "url": "https://bugzilla.suse.com/1157155" }, { "category": "self", "summary": "SUSE Bug 1157157", "url": "https://bugzilla.suse.com/1157157" }, { "category": "self", "summary": "SUSE Bug 1157158", "url": "https://bugzilla.suse.com/1157158" }, { "category": "self", "summary": "SUSE Bug 1157162", "url": "https://bugzilla.suse.com/1157162" }, { "category": "self", "summary": "SUSE Bug 1157169", "url": "https://bugzilla.suse.com/1157169" }, { "category": "self", "summary": "SUSE Bug 1157171", "url": "https://bugzilla.suse.com/1157171" }, { "category": "self", "summary": "SUSE Bug 1157173", "url": "https://bugzilla.suse.com/1157173" }, { "category": "self", "summary": "SUSE Bug 1157178", "url": "https://bugzilla.suse.com/1157178" }, { "category": "self", "summary": "SUSE Bug 1157180", "url": "https://bugzilla.suse.com/1157180" }, { "category": "self", "summary": "SUSE Bug 1157182", "url": "https://bugzilla.suse.com/1157182" }, { "category": "self", "summary": "SUSE Bug 1157183", "url": "https://bugzilla.suse.com/1157183" }, { "category": "self", "summary": "SUSE Bug 1157184", "url": "https://bugzilla.suse.com/1157184" }, { "category": "self", "summary": "SUSE Bug 1157191", "url": "https://bugzilla.suse.com/1157191" }, { "category": "self", "summary": "SUSE Bug 1157193", "url": "https://bugzilla.suse.com/1157193" }, { "category": "self", "summary": "SUSE Bug 1157197", "url": "https://bugzilla.suse.com/1157197" }, { "category": "self", "summary": "SUSE Bug 1157298", "url": "https://bugzilla.suse.com/1157298" }, { "category": "self", "summary": "SUSE Bug 1157303", "url": "https://bugzilla.suse.com/1157303" }, { "category": "self", "summary": "SUSE Bug 1157307", "url": "https://bugzilla.suse.com/1157307" }, { "category": "self", "summary": "SUSE Bug 1157324", "url": "https://bugzilla.suse.com/1157324" }, { "category": "self", "summary": "SUSE Bug 1157333", "url": "https://bugzilla.suse.com/1157333" }, { "category": "self", "summary": "SUSE Bug 1157424", "url": "https://bugzilla.suse.com/1157424" }, { "category": "self", "summary": "SUSE Bug 1157463", "url": "https://bugzilla.suse.com/1157463" }, { "category": "self", "summary": "SUSE Bug 1157499", "url": "https://bugzilla.suse.com/1157499" }, { "category": "self", "summary": "SUSE Bug 1157678", "url": "https://bugzilla.suse.com/1157678" }, { "category": "self", "summary": "SUSE Bug 1157692", "url": "https://bugzilla.suse.com/1157692" }, { "category": "self", "summary": "SUSE Bug 1157698", "url": "https://bugzilla.suse.com/1157698" }, { "category": "self", "summary": "SUSE Bug 1157778", "url": "https://bugzilla.suse.com/1157778" }, { "category": "self", "summary": "SUSE Bug 1157853", "url": "https://bugzilla.suse.com/1157853" }, { "category": "self", "summary": "SUSE Bug 1157908", "url": "https://bugzilla.suse.com/1157908" }, { "category": "self", "summary": "SUSE Bug 1158013", "url": "https://bugzilla.suse.com/1158013" }, { "category": "self", "summary": "SUSE Bug 1158021", "url": "https://bugzilla.suse.com/1158021" }, { "category": "self", "summary": "SUSE Bug 1158026", "url": "https://bugzilla.suse.com/1158026" }, { "category": "self", "summary": "SUSE Bug 1158049", "url": "https://bugzilla.suse.com/1158049" }, { "category": "self", "summary": "SUSE Bug 1158063", "url": "https://bugzilla.suse.com/1158063" }, { "category": "self", "summary": "SUSE Bug 1158064", "url": "https://bugzilla.suse.com/1158064" }, { "category": "self", "summary": "SUSE Bug 1158065", "url": "https://bugzilla.suse.com/1158065" }, { "category": "self", "summary": "SUSE Bug 1158066", "url": "https://bugzilla.suse.com/1158066" }, { "category": "self", "summary": "SUSE Bug 1158067", "url": "https://bugzilla.suse.com/1158067" }, { "category": "self", "summary": "SUSE Bug 1158068", "url": "https://bugzilla.suse.com/1158068" }, { "category": "self", "summary": "SUSE Bug 1158082", "url": "https://bugzilla.suse.com/1158082" }, { "category": "self", "summary": "SUSE Bug 1158094", "url": "https://bugzilla.suse.com/1158094" }, { "category": "self", "summary": "SUSE Bug 1158132", "url": "https://bugzilla.suse.com/1158132" }, { "category": "self", "summary": "SUSE Bug 1158381", "url": "https://bugzilla.suse.com/1158381" }, { "category": "self", "summary": "SUSE Bug 1158394", "url": "https://bugzilla.suse.com/1158394" }, { "category": "self", "summary": "SUSE Bug 1158398", "url": "https://bugzilla.suse.com/1158398" }, { "category": "self", "summary": "SUSE Bug 1158407", "url": "https://bugzilla.suse.com/1158407" }, { "category": "self", "summary": "SUSE Bug 1158410", "url": "https://bugzilla.suse.com/1158410" }, { "category": "self", "summary": "SUSE Bug 1158413", "url": "https://bugzilla.suse.com/1158413" }, { "category": "self", "summary": "SUSE Bug 1158417", "url": "https://bugzilla.suse.com/1158417" }, { "category": "self", "summary": "SUSE Bug 1158427", "url": "https://bugzilla.suse.com/1158427" }, { "category": "self", "summary": "SUSE Bug 1158445", "url": "https://bugzilla.suse.com/1158445" }, { "category": "self", "summary": "SUSE Bug 1158533", "url": "https://bugzilla.suse.com/1158533" }, { "category": "self", "summary": "SUSE Bug 1158637", "url": "https://bugzilla.suse.com/1158637" }, { "category": "self", "summary": "SUSE Bug 1158638", "url": "https://bugzilla.suse.com/1158638" }, { "category": "self", "summary": "SUSE Bug 1158639", "url": "https://bugzilla.suse.com/1158639" }, { "category": "self", "summary": "SUSE Bug 1158640", "url": "https://bugzilla.suse.com/1158640" }, { "category": "self", "summary": "SUSE Bug 1158641", "url": "https://bugzilla.suse.com/1158641" }, { "category": "self", "summary": "SUSE Bug 1158643", "url": "https://bugzilla.suse.com/1158643" }, { "category": "self", "summary": "SUSE Bug 1158644", "url": "https://bugzilla.suse.com/1158644" }, { "category": "self", "summary": "SUSE Bug 1158645", "url": "https://bugzilla.suse.com/1158645" }, { "category": "self", "summary": "SUSE Bug 1158646", "url": "https://bugzilla.suse.com/1158646" }, { "category": "self", "summary": "SUSE Bug 1158647", "url": "https://bugzilla.suse.com/1158647" }, { "category": "self", "summary": "SUSE Bug 1158649", "url": "https://bugzilla.suse.com/1158649" }, { "category": "self", "summary": "SUSE Bug 1158651", "url": "https://bugzilla.suse.com/1158651" }, { "category": "self", "summary": "SUSE Bug 1158652", "url": "https://bugzilla.suse.com/1158652" }, { "category": "self", "summary": "SUSE Bug 1158819", "url": "https://bugzilla.suse.com/1158819" }, { "category": "self", "summary": "SUSE Bug 1158823", "url": "https://bugzilla.suse.com/1158823" }, { "category": "self", "summary": "SUSE Bug 1158824", "url": "https://bugzilla.suse.com/1158824" }, { "category": "self", "summary": "SUSE Bug 1158827", "url": "https://bugzilla.suse.com/1158827" }, { "category": "self", "summary": "SUSE Bug 1158834", "url": "https://bugzilla.suse.com/1158834" }, { "category": "self", "summary": "SUSE Bug 1158893", "url": "https://bugzilla.suse.com/1158893" }, { "category": "self", "summary": "SUSE Bug 1158900", "url": "https://bugzilla.suse.com/1158900" }, { "category": "self", "summary": "SUSE Bug 1158903", "url": "https://bugzilla.suse.com/1158903" }, { "category": "self", "summary": "SUSE Bug 1158904", "url": "https://bugzilla.suse.com/1158904" }, { "category": "self", "summary": "SUSE Bug 1158954", "url": "https://bugzilla.suse.com/1158954" }, { "category": "self", "summary": "SUSE Bug 1159024", "url": "https://bugzilla.suse.com/1159024" }, { "category": "self", "summary": "SUSE Bug 1159028", "url": "https://bugzilla.suse.com/1159028" }, { "category": "self", "summary": "SUSE Bug 1159297", "url": "https://bugzilla.suse.com/1159297" }, { "category": "self", "summary": "SUSE Bug 1159394", "url": "https://bugzilla.suse.com/1159394" }, { "category": "self", "summary": "SUSE Bug 1159483", "url": "https://bugzilla.suse.com/1159483" }, { "category": "self", "summary": "SUSE Bug 1159484", "url": "https://bugzilla.suse.com/1159484" }, { "category": "self", "summary": "SUSE Bug 1159569", "url": "https://bugzilla.suse.com/1159569" }, { "category": "self", "summary": "SUSE Bug 1159588", "url": "https://bugzilla.suse.com/1159588" }, { "category": "self", "summary": "SUSE Bug 1159841", "url": "https://bugzilla.suse.com/1159841" }, { "category": "self", "summary": "SUSE Bug 1159908", "url": "https://bugzilla.suse.com/1159908" }, { "category": "self", "summary": "SUSE Bug 1159909", "url": "https://bugzilla.suse.com/1159909" }, { "category": "self", "summary": "SUSE Bug 1159910", "url": "https://bugzilla.suse.com/1159910" }, { "category": "self", "summary": "SUSE Bug 1159911", "url": "https://bugzilla.suse.com/1159911" }, { "category": "self", "summary": "SUSE Bug 1159955", "url": "https://bugzilla.suse.com/1159955" }, { "category": "self", "summary": "SUSE Bug 1160195", "url": "https://bugzilla.suse.com/1160195" }, { "category": "self", "summary": "SUSE Bug 1160210", "url": "https://bugzilla.suse.com/1160210" }, { "category": "self", "summary": "SUSE Bug 1160211", "url": "https://bugzilla.suse.com/1160211" }, { "category": "self", "summary": "SUSE Bug 1160433", "url": "https://bugzilla.suse.com/1160433" }, { "category": "self", "summary": "SUSE Bug 1160442", "url": "https://bugzilla.suse.com/1160442" }, { "category": "self", "summary": "SUSE Bug 1160476", "url": "https://bugzilla.suse.com/1160476" }, { "category": "self", "summary": "SUSE Bug 1160560", "url": "https://bugzilla.suse.com/1160560" }, { "category": "self", "summary": "SUSE Bug 1160755", "url": "https://bugzilla.suse.com/1160755" }, { "category": "self", "summary": "SUSE Bug 1160756", "url": "https://bugzilla.suse.com/1160756" }, { "category": "self", "summary": "SUSE Bug 1160784", "url": "https://bugzilla.suse.com/1160784" }, { "category": "self", "summary": "SUSE Bug 1160787", "url": "https://bugzilla.suse.com/1160787" }, { "category": "self", "summary": "SUSE Bug 1160802", "url": "https://bugzilla.suse.com/1160802" }, { "category": "self", "summary": "SUSE Bug 1160803", "url": "https://bugzilla.suse.com/1160803" }, { "category": "self", "summary": "SUSE Bug 1160804", "url": "https://bugzilla.suse.com/1160804" }, { "category": "self", "summary": "SUSE Bug 1160917", "url": "https://bugzilla.suse.com/1160917" }, { "category": "self", "summary": "SUSE Bug 1160966", "url": "https://bugzilla.suse.com/1160966" }, { "category": "self", "summary": "SUSE Bug 1161087", "url": "https://bugzilla.suse.com/1161087" }, { "category": "self", "summary": "SUSE Bug 1161514", "url": "https://bugzilla.suse.com/1161514" }, { "category": "self", "summary": "SUSE Bug 1161518", "url": "https://bugzilla.suse.com/1161518" }, { "category": "self", "summary": "SUSE Bug 1161522", "url": "https://bugzilla.suse.com/1161522" }, { "category": "self", "summary": "SUSE Bug 1161523", "url": "https://bugzilla.suse.com/1161523" }, { "category": "self", "summary": "SUSE Bug 1161549", "url": "https://bugzilla.suse.com/1161549" }, { "category": "self", "summary": "SUSE Bug 1161552", "url": "https://bugzilla.suse.com/1161552" }, { "category": "self", "summary": "SUSE Bug 1161674", "url": "https://bugzilla.suse.com/1161674" }, { "category": "self", "summary": "SUSE Bug 1161875", "url": "https://bugzilla.suse.com/1161875" }, { "category": "self", "summary": "SUSE Bug 1161931", "url": "https://bugzilla.suse.com/1161931" }, { "category": "self", "summary": "SUSE Bug 1161933", "url": "https://bugzilla.suse.com/1161933" }, { "category": "self", "summary": "SUSE Bug 1161934", "url": "https://bugzilla.suse.com/1161934" }, { "category": "self", "summary": "SUSE Bug 1161935", "url": "https://bugzilla.suse.com/1161935" }, { "category": "self", "summary": "SUSE Bug 1161936", "url": "https://bugzilla.suse.com/1161936" }, { "category": "self", "summary": "SUSE Bug 1161937", "url": "https://bugzilla.suse.com/1161937" }, { "category": "self", "summary": "SUSE Bug 1162028", "url": "https://bugzilla.suse.com/1162028" }, { "category": "self", "summary": "SUSE Bug 1162067", "url": "https://bugzilla.suse.com/1162067" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14615 page", "url": "https://www.suse.com/security/cve/CVE-2019-14615/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14895 page", "url": "https://www.suse.com/security/cve/CVE-2019-14895/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14896 page", "url": "https://www.suse.com/security/cve/CVE-2019-14896/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14897 page", "url": "https://www.suse.com/security/cve/CVE-2019-14897/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14901 page", "url": "https://www.suse.com/security/cve/CVE-2019-14901/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15213 page", "url": "https://www.suse.com/security/cve/CVE-2019-15213/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16994 page", "url": "https://www.suse.com/security/cve/CVE-2019-16994/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18660 page", "url": "https://www.suse.com/security/cve/CVE-2019-18660/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18683 page", "url": "https://www.suse.com/security/cve/CVE-2019-18683/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18808 page", "url": "https://www.suse.com/security/cve/CVE-2019-18808/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18809 page", "url": "https://www.suse.com/security/cve/CVE-2019-18809/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19036 page", "url": "https://www.suse.com/security/cve/CVE-2019-19036/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19045 page", "url": "https://www.suse.com/security/cve/CVE-2019-19045/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19049 page", "url": "https://www.suse.com/security/cve/CVE-2019-19049/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19051 page", "url": "https://www.suse.com/security/cve/CVE-2019-19051/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19052 page", "url": "https://www.suse.com/security/cve/CVE-2019-19052/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19054 page", "url": "https://www.suse.com/security/cve/CVE-2019-19054/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19056 page", "url": "https://www.suse.com/security/cve/CVE-2019-19056/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19057 page", "url": "https://www.suse.com/security/cve/CVE-2019-19057/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19058 page", "url": "https://www.suse.com/security/cve/CVE-2019-19058/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19060 page", "url": "https://www.suse.com/security/cve/CVE-2019-19060/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19062 page", "url": "https://www.suse.com/security/cve/CVE-2019-19062/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19063 page", "url": "https://www.suse.com/security/cve/CVE-2019-19063/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19065 page", "url": "https://www.suse.com/security/cve/CVE-2019-19065/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19066 page", "url": "https://www.suse.com/security/cve/CVE-2019-19066/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19067 page", "url": "https://www.suse.com/security/cve/CVE-2019-19067/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19068 page", "url": "https://www.suse.com/security/cve/CVE-2019-19068/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19073 page", "url": "https://www.suse.com/security/cve/CVE-2019-19073/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19074 page", "url": "https://www.suse.com/security/cve/CVE-2019-19074/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19075 page", "url": "https://www.suse.com/security/cve/CVE-2019-19075/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19077 page", "url": "https://www.suse.com/security/cve/CVE-2019-19077/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19227 page", "url": "https://www.suse.com/security/cve/CVE-2019-19227/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19318 page", "url": "https://www.suse.com/security/cve/CVE-2019-19318/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19319 page", "url": "https://www.suse.com/security/cve/CVE-2019-19319/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19332 page", "url": "https://www.suse.com/security/cve/CVE-2019-19332/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19338 page", "url": "https://www.suse.com/security/cve/CVE-2019-19338/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19447 page", "url": "https://www.suse.com/security/cve/CVE-2019-19447/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19523 page", "url": "https://www.suse.com/security/cve/CVE-2019-19523/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19524 page", "url": "https://www.suse.com/security/cve/CVE-2019-19524/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19525 page", "url": "https://www.suse.com/security/cve/CVE-2019-19525/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19526 page", "url": "https://www.suse.com/security/cve/CVE-2019-19526/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19527 page", "url": "https://www.suse.com/security/cve/CVE-2019-19527/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19528 page", "url": "https://www.suse.com/security/cve/CVE-2019-19528/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19529 page", "url": "https://www.suse.com/security/cve/CVE-2019-19529/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19530 page", "url": "https://www.suse.com/security/cve/CVE-2019-19530/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19531 page", "url": "https://www.suse.com/security/cve/CVE-2019-19531/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19532 page", "url": "https://www.suse.com/security/cve/CVE-2019-19532/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19533 page", "url": "https://www.suse.com/security/cve/CVE-2019-19533/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19534 page", "url": "https://www.suse.com/security/cve/CVE-2019-19534/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19535 page", "url": "https://www.suse.com/security/cve/CVE-2019-19535/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19536 page", "url": "https://www.suse.com/security/cve/CVE-2019-19536/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19537 page", "url": "https://www.suse.com/security/cve/CVE-2019-19537/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19543 page", "url": "https://www.suse.com/security/cve/CVE-2019-19543/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19767 page", "url": "https://www.suse.com/security/cve/CVE-2019-19767/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19965 page", "url": "https://www.suse.com/security/cve/CVE-2019-19965/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19966 page", "url": "https://www.suse.com/security/cve/CVE-2019-19966/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20054 page", "url": "https://www.suse.com/security/cve/CVE-2019-20054/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20095 page", "url": "https://www.suse.com/security/cve/CVE-2019-20095/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20096 page", "url": "https://www.suse.com/security/cve/CVE-2019-20096/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-7053 page", "url": "https://www.suse.com/security/cve/CVE-2020-7053/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-03-05T15:16:11Z", "generator": { "date": "2020-03-05T15:16:11Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:0599-1", "initial_release_date": "2020-03-05T15:16:11Z", "revision_history": [ { "date": "2020-03-05T15:16:11Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.12.14-8.12.1.noarch", "product": { "name": "kernel-devel-rt-4.12.14-8.12.1.noarch", "product_id": "kernel-devel-rt-4.12.14-8.12.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.12.14-8.12.1.noarch", "product": { "name": "kernel-source-rt-4.12.14-8.12.1.noarch", "product_id": "kernel-source-rt-4.12.14-8.12.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "product_id": "cluster-md-kmp-rt-4.12.14-8.12.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.12.14-8.12.1.x86_64", "product": { "name": "dlm-kmp-rt-4.12.14-8.12.1.x86_64", "product_id": "dlm-kmp-rt-4.12.14-8.12.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "product_id": "gfs2-kmp-rt-4.12.14-8.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.12.14-8.12.1.x86_64", "product": { "name": "kernel-rt-4.12.14-8.12.1.x86_64", "product_id": "kernel-rt-4.12.14-8.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.12.14-8.12.1.x86_64", "product": { "name": "kernel-rt-base-4.12.14-8.12.1.x86_64", "product_id": "kernel-rt-base-4.12.14-8.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.12.14-8.12.1.x86_64", "product": { "name": "kernel-rt-devel-4.12.14-8.12.1.x86_64", "product_id": "kernel-rt-devel-4.12.14-8.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "product_id": "kernel-rt_debug-devel-4.12.14-8.12.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.12.14-8.12.1.x86_64", "product": { "name": "kernel-syms-rt-4.12.14-8.12.1.x86_64", "product_id": "kernel-syms-rt-4.12.14-8.12.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", "product_id": "ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP4", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.12.14-8.12.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.12.14-8.12.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.12.14-8.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.12.14-8.12.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.12.14-8.12.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch" }, "product_reference": "kernel-devel-rt-4.12.14-8.12.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.12.14-8.12.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64" }, "product_reference": "kernel-rt-4.12.14-8.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.12.14-8.12.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64" }, "product_reference": "kernel-rt-base-4.12.14-8.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.12.14-8.12.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64" }, "product_reference": "kernel-rt-devel-4.12.14-8.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.12.14-8.12.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.12.14-8.12.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch" }, "product_reference": "kernel-source-rt-4.12.14-8.12.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.12.14-8.12.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64" }, "product_reference": "kernel-syms-rt-4.12.14-8.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.12.14-8.12.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.12.14-8.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-14615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14615" } ], "notes": [ { "category": "general", "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14615", "url": "https://www.suse.com/security/cve/CVE-2019-14615" }, { "category": "external", "summary": "SUSE Bug 1160195 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1160195" }, { "category": "external", "summary": "SUSE Bug 1165881 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1165881" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-14615" }, { "cve": "CVE-2019-14895", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14895" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14895", "url": "https://www.suse.com/security/cve/CVE-2019-14895" }, { "category": "external", "summary": "SUSE Bug 1157042 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1157042" }, { "category": "external", "summary": "SUSE Bug 1157158 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1157158" }, { "category": "external", "summary": "SUSE Bug 1173100 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1173100" }, { "category": "external", "summary": "SUSE Bug 1173660 for CVE-2019-14895", "url": "https://bugzilla.suse.com/1173660" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "important" } ], "title": "CVE-2019-14895" }, { "cve": "CVE-2019-14896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14896" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14896", "url": "https://www.suse.com/security/cve/CVE-2019-14896" }, { "category": "external", "summary": "SUSE Bug 1157157 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1157157" }, { "category": "external", "summary": "SUSE Bug 1160468 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1160468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "important" } ], "title": "CVE-2019-14896" }, { "cve": "CVE-2019-14897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14897" } ], "notes": [ { "category": "general", "text": "A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14897", "url": "https://www.suse.com/security/cve/CVE-2019-14897" }, { "category": "external", "summary": "SUSE Bug 1157155 for CVE-2019-14897", "url": "https://bugzilla.suse.com/1157155" }, { "category": "external", "summary": "SUSE Bug 1160467 for CVE-2019-14897", "url": "https://bugzilla.suse.com/1160467" }, { "category": "external", "summary": "SUSE Bug 1160468 for CVE-2019-14897", "url": "https://bugzilla.suse.com/1160468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "important" } ], "title": "CVE-2019-14897" }, { "cve": "CVE-2019-14901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14901" } ], "notes": [ { "category": "general", "text": "A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14901", "url": "https://www.suse.com/security/cve/CVE-2019-14901" }, { "category": "external", "summary": "SUSE Bug 1157042 for CVE-2019-14901", "url": "https://bugzilla.suse.com/1157042" }, { "category": "external", "summary": "SUSE Bug 1173661 for CVE-2019-14901", "url": "https://bugzilla.suse.com/1173661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "important" } ], "title": "CVE-2019-14901" }, { "cve": "CVE-2019-15213", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15213" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2.3. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15213", "url": "https://www.suse.com/security/cve/CVE-2019-15213" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15213", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146544 for CVE-2019-15213", "url": "https://bugzilla.suse.com/1146544" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15213", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15213", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-15213" }, { "cve": "CVE-2019-16994", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16994" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.0, a memory leak exists in sit_init_net() in net/ipv6/sit.c when register_netdev() fails to register sitn-\u003efb_tunnel_dev, which may cause denial of service, aka CID-07f12b26e21a.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16994", "url": "https://www.suse.com/security/cve/CVE-2019-16994" }, { "category": "external", "summary": "SUSE Bug 1161523 for CVE-2019-16994", "url": "https://bugzilla.suse.com/1161523" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-16994" }, { "cve": "CVE-2019-18660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18660" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18660", "url": "https://www.suse.com/security/cve/CVE-2019-18660" }, { "category": "external", "summary": "SUSE Bug 1157038 for CVE-2019-18660", "url": "https://bugzilla.suse.com/1157038" }, { "category": "external", "summary": "SUSE Bug 1157923 for CVE-2019-18660", "url": "https://bugzilla.suse.com/1157923" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-18660" }, { "cve": "CVE-2019-18683", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18683" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18683", "url": "https://www.suse.com/security/cve/CVE-2019-18683" }, { "category": "external", "summary": "SUSE Bug 1155897 for CVE-2019-18683", "url": "https://bugzilla.suse.com/1155897" }, { "category": "external", "summary": "SUSE Bug 1173868 for CVE-2019-18683", "url": "https://bugzilla.suse.com/1173868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "important" } ], "title": "CVE-2019-18683" }, { "cve": "CVE-2019-18808", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18808" } ], "notes": [ { "category": "general", "text": "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18808", "url": "https://www.suse.com/security/cve/CVE-2019-18808" }, { "category": "external", "summary": "SUSE Bug 1156259 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1156259" }, { "category": "external", "summary": "SUSE Bug 1189884 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1189884" }, { "category": "external", "summary": "SUSE Bug 1190534 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1190534" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-18808" }, { "cve": "CVE-2019-18809", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18809" } ], "notes": [ { "category": "general", "text": "A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-2289adbfa559.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18809", "url": "https://www.suse.com/security/cve/CVE-2019-18809" }, { "category": "external", "summary": "SUSE Bug 1156258 for CVE-2019-18809", "url": "https://bugzilla.suse.com/1156258" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-18809" }, { "cve": "CVE-2019-19036", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19036" } ], "notes": [ { "category": "general", "text": "btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root-\u003enode) can be zero.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19036", "url": "https://www.suse.com/security/cve/CVE-2019-19036" }, { "category": "external", "summary": "SUSE Bug 1157692 for CVE-2019-19036", "url": "https://bugzilla.suse.com/1157692" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19036" }, { "cve": "CVE-2019-19045", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19045" } ], "notes": [ { "category": "general", "text": "A memory leak in the mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19045", "url": "https://www.suse.com/security/cve/CVE-2019-19045" }, { "category": "external", "summary": "SUSE Bug 1161522 for CVE-2019-19045", "url": "https://bugzilla.suse.com/1161522" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19045" }, { "cve": "CVE-2019-19049", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19049" } ], "notes": [ { "category": "general", "text": "A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can only be reached during boot", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19049", "url": "https://www.suse.com/security/cve/CVE-2019-19049" }, { "category": "external", "summary": "SUSE Bug 1157173 for CVE-2019-19049", "url": "https://bugzilla.suse.com/1157173" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 1.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19049" }, { "cve": "CVE-2019-19051", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19051" } ], "notes": [ { "category": "general", "text": "A memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19051", "url": "https://www.suse.com/security/cve/CVE-2019-19051" }, { "category": "external", "summary": "SUSE Bug 1159024 for CVE-2019-19051", "url": "https://bugzilla.suse.com/1159024" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19051" }, { "cve": "CVE-2019-19052", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19052" } ], "notes": [ { "category": "general", "text": "A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19052", "url": "https://www.suse.com/security/cve/CVE-2019-19052" }, { "category": "external", "summary": "SUSE Bug 1157324 for CVE-2019-19052", "url": "https://bugzilla.suse.com/1157324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19052" }, { "cve": "CVE-2019-19054", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19054" } ], "notes": [ { "category": "general", "text": "A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19054", "url": "https://www.suse.com/security/cve/CVE-2019-19054" }, { "category": "external", "summary": "SUSE Bug 1161518 for CVE-2019-19054", "url": "https://bugzilla.suse.com/1161518" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19054" }, { "cve": "CVE-2019-19056", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19056" } ], "notes": [ { "category": "general", "text": "A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19056", "url": "https://www.suse.com/security/cve/CVE-2019-19056" }, { "category": "external", "summary": "SUSE Bug 1157197 for CVE-2019-19056", "url": "https://bugzilla.suse.com/1157197" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19056" }, { "cve": "CVE-2019-19057", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19057" } ], "notes": [ { "category": "general", "text": "Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19057", "url": "https://www.suse.com/security/cve/CVE-2019-19057" }, { "category": "external", "summary": "SUSE Bug 1157193 for CVE-2019-19057", "url": "https://bugzilla.suse.com/1157193" }, { "category": "external", "summary": "SUSE Bug 1157197 for CVE-2019-19057", "url": "https://bugzilla.suse.com/1157197" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19057" }, { "cve": "CVE-2019-19058", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19058" } ], "notes": [ { "category": "general", "text": "A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures, aka CID-b4b814fec1a5.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19058", "url": "https://www.suse.com/security/cve/CVE-2019-19058" }, { "category": "external", "summary": "SUSE Bug 1157145 for CVE-2019-19058", "url": "https://bugzilla.suse.com/1157145" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19058" }, { "cve": "CVE-2019-19060", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19060" } ], "notes": [ { "category": "general", "text": "A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19060", "url": "https://www.suse.com/security/cve/CVE-2019-19060" }, { "category": "external", "summary": "SUSE Bug 1157178 for CVE-2019-19060", "url": "https://bugzilla.suse.com/1157178" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19060" }, { "cve": "CVE-2019-19062", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19062" } ], "notes": [ { "category": "general", "text": "A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19062", "url": "https://www.suse.com/security/cve/CVE-2019-19062" }, { "category": "external", "summary": "SUSE Bug 1157333 for CVE-2019-19062", "url": "https://bugzilla.suse.com/1157333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19062" }, { "cve": "CVE-2019-19063", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19063" } ], "notes": [ { "category": "general", "text": "Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19063", "url": "https://www.suse.com/security/cve/CVE-2019-19063" }, { "category": "external", "summary": "SUSE Bug 1157298 for CVE-2019-19063", "url": "https://bugzilla.suse.com/1157298" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19063" }, { "cve": "CVE-2019-19065", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19065" } ], "notes": [ { "category": "general", "text": "A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e. NOTE: This has been disputed as not a vulnerability because \"rhashtable_init() can only fail if it is passed invalid values in the second parameter\u0027s struct, but when invoked from sdma_init() that is a pointer to a static const struct, so an attacker could only trigger failure if they could corrupt kernel memory (in which case a small memory leak is not a significant problem).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19065", "url": "https://www.suse.com/security/cve/CVE-2019-19065" }, { "category": "external", "summary": "SUSE Bug 1157191 for CVE-2019-19065", "url": "https://bugzilla.suse.com/1157191" }, { "category": "external", "summary": "SUSE Bug 1173961 for CVE-2019-19065", "url": "https://bugzilla.suse.com/1173961" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "important" } ], "title": "CVE-2019-19065" }, { "cve": "CVE-2019-19066", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19066" } ], "notes": [ { "category": "general", "text": "A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19066", "url": "https://www.suse.com/security/cve/CVE-2019-19066" }, { "category": "external", "summary": "SUSE Bug 1157303 for CVE-2019-19066", "url": "https://bugzilla.suse.com/1157303" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19066" }, { "cve": "CVE-2019-19067", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19067" } ], "notes": [ { "category": "general", "text": "Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the relevance of this because the attacker must already have privileges for module loading", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19067", "url": "https://www.suse.com/security/cve/CVE-2019-19067" }, { "category": "external", "summary": "SUSE Bug 1157180 for CVE-2019-19067", "url": "https://bugzilla.suse.com/1157180" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19067" }, { "cve": "CVE-2019-19068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19068" } ], "notes": [ { "category": "general", "text": "A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19068", "url": "https://www.suse.com/security/cve/CVE-2019-19068" }, { "category": "external", "summary": "SUSE Bug 1157307 for CVE-2019-19068", "url": "https://bugzilla.suse.com/1157307" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19068" }, { "cve": "CVE-2019-19073", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19073" } ], "notes": [ { "category": "general", "text": "Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19073", "url": "https://www.suse.com/security/cve/CVE-2019-19073" }, { "category": "external", "summary": "SUSE Bug 1157070 for CVE-2019-19073", "url": "https://bugzilla.suse.com/1157070" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19073" }, { "cve": "CVE-2019-19074", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19074" } ], "notes": [ { "category": "general", "text": "A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19074", "url": "https://www.suse.com/security/cve/CVE-2019-19074" }, { "category": "external", "summary": "SUSE Bug 1157143 for CVE-2019-19074", "url": "https://bugzilla.suse.com/1157143" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19074" }, { "cve": "CVE-2019-19075", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19075" } ], "notes": [ { "category": "general", "text": "A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19075", "url": "https://www.suse.com/security/cve/CVE-2019-19075" }, { "category": "external", "summary": "SUSE Bug 1157162 for CVE-2019-19075", "url": "https://bugzilla.suse.com/1157162" }, { "category": "external", "summary": "SUSE Bug 1173958 for CVE-2019-19075", "url": "https://bugzilla.suse.com/1173958" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "low" } ], "title": "CVE-2019-19075" }, { "cve": "CVE-2019-19077", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19077" } ], "notes": [ { "category": "general", "text": "A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19077", "url": "https://www.suse.com/security/cve/CVE-2019-19077" }, { "category": "external", "summary": "SUSE Bug 1157171 for CVE-2019-19077", "url": "https://bugzilla.suse.com/1157171" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19077" }, { "cve": "CVE-2019-19227", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19227" } ], "notes": [ { "category": "general", "text": "In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19227", "url": "https://www.suse.com/security/cve/CVE-2019-19227" }, { "category": "external", "summary": "SUSE Bug 1157678 for CVE-2019-19227", "url": "https://bugzilla.suse.com/1157678" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19227" }, { "cve": "CVE-2019-19318", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19318" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.3.11, mounting a crafted btrfs image twice can cause an rwsem_down_write_slowpath use-after-free because (in rwsem_can_spin_on_owner in kernel/locking/rwsem.c) rwsem_owner_flags returns an already freed pointer,", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19318", "url": "https://www.suse.com/security/cve/CVE-2019-19318" }, { "category": "external", "summary": "SUSE Bug 1158026 for CVE-2019-19318", "url": "https://bugzilla.suse.com/1158026" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19318" }, { "cve": "CVE-2019-19319", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19319" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19319", "url": "https://www.suse.com/security/cve/CVE-2019-19319" }, { "category": "external", "summary": "SUSE Bug 1158021 for CVE-2019-19319", "url": "https://bugzilla.suse.com/1158021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19319" }, { "cve": "CVE-2019-19332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19332" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19332", "url": "https://www.suse.com/security/cve/CVE-2019-19332" }, { "category": "external", "summary": "SUSE Bug 1158827 for CVE-2019-19332", "url": "https://bugzilla.suse.com/1158827" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19332" }, { "cve": "CVE-2019-19338", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19338" } ], "notes": [ { "category": "general", "text": "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has \u0027TSX\u0027 enabled. Confidentiality of data is the highest threat associated with this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19338", "url": "https://www.suse.com/security/cve/CVE-2019-19338" }, { "category": "external", "summary": "SUSE Bug 1158954 for CVE-2019-19338", "url": "https://bugzilla.suse.com/1158954" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19338" }, { "cve": "CVE-2019-19447", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19447" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19447", "url": "https://www.suse.com/security/cve/CVE-2019-19447" }, { "category": "external", "summary": "SUSE Bug 1158819 for CVE-2019-19447", "url": "https://bugzilla.suse.com/1158819" }, { "category": "external", "summary": "SUSE Bug 1173869 for CVE-2019-19447", "url": "https://bugzilla.suse.com/1173869" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "important" } ], "title": "CVE-2019-19447" }, { "cve": "CVE-2019-19523", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19523" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19523", "url": "https://www.suse.com/security/cve/CVE-2019-19523" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19523", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158823 for CVE-2019-19523", "url": "https://bugzilla.suse.com/1158823" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19523", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19523" }, { "cve": "CVE-2019-19524", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19524" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19524", "url": "https://www.suse.com/security/cve/CVE-2019-19524" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19524", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158413 for CVE-2019-19524", "url": "https://bugzilla.suse.com/1158413" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19524", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "low" } ], "title": "CVE-2019-19524" }, { "cve": "CVE-2019-19525", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19525" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.3.6, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19525", "url": "https://www.suse.com/security/cve/CVE-2019-19525" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19525", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158417 for CVE-2019-19525", "url": "https://bugzilla.suse.com/1158417" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19525", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19525" }, { "cve": "CVE-2019-19526", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19526" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.3.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19526", "url": "https://www.suse.com/security/cve/CVE-2019-19526" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19526", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19526", "url": "https://bugzilla.suse.com/1158834" }, { "category": "external", "summary": "SUSE Bug 1158893 for CVE-2019-19526", "url": "https://bugzilla.suse.com/1158893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19526" }, { "cve": "CVE-2019-19527", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19527" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19527", "url": "https://www.suse.com/security/cve/CVE-2019-19527" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19527", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19527", "url": "https://bugzilla.suse.com/1158834" }, { "category": "external", "summary": "SUSE Bug 1158900 for CVE-2019-19527", "url": "https://bugzilla.suse.com/1158900" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19527" }, { "cve": "CVE-2019-19528", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19528" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19528", "url": "https://www.suse.com/security/cve/CVE-2019-19528" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19528", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158407 for CVE-2019-19528", "url": "https://bugzilla.suse.com/1158407" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19528", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19528" }, { "cve": "CVE-2019-19529", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19529" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.3.11, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver, aka CID-4d6636498c41.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19529", "url": "https://www.suse.com/security/cve/CVE-2019-19529" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19529", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19529", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19529" }, { "cve": "CVE-2019-19530", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19530" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19530", "url": "https://www.suse.com/security/cve/CVE-2019-19530" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19530", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158410 for CVE-2019-19530", "url": "https://bugzilla.suse.com/1158410" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19530", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19530" }, { "cve": "CVE-2019-19531", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19531" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19531", "url": "https://www.suse.com/security/cve/CVE-2019-19531" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19531", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158427 for CVE-2019-19531", "url": "https://bugzilla.suse.com/1158427" }, { "category": "external", "summary": "SUSE Bug 1158445 for CVE-2019-19531", "url": "https://bugzilla.suse.com/1158445" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19531", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "low" } ], "title": "CVE-2019-19531" }, { "cve": "CVE-2019-19532", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19532" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19532", "url": "https://www.suse.com/security/cve/CVE-2019-19532" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19532", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158823 for CVE-2019-19532", "url": "https://bugzilla.suse.com/1158823" }, { "category": "external", "summary": "SUSE Bug 1158824 for CVE-2019-19532", "url": "https://bugzilla.suse.com/1158824" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19532", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19532" }, { "cve": "CVE-2019-19533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19533" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.3.4, there is an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19533", "url": "https://www.suse.com/security/cve/CVE-2019-19533" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19533", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19533", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19533" }, { "cve": "CVE-2019-19534", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19534" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.3.11, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19534", "url": "https://www.suse.com/security/cve/CVE-2019-19534" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19534", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158398 for CVE-2019-19534", "url": "https://bugzilla.suse.com/1158398" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19534", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "low" } ], "title": "CVE-2019-19534" }, { "cve": "CVE-2019-19535", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19535" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19535", "url": "https://www.suse.com/security/cve/CVE-2019-19535" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19535", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19535", "url": "https://bugzilla.suse.com/1158834" }, { "category": "external", "summary": "SUSE Bug 1158903 for CVE-2019-19535", "url": "https://bugzilla.suse.com/1158903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19535" }, { "cve": "CVE-2019-19536", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19536" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19536", "url": "https://www.suse.com/security/cve/CVE-2019-19536" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19536", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158394 for CVE-2019-19536", "url": "https://bugzilla.suse.com/1158394" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19536", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "low" } ], "title": "CVE-2019-19536" }, { "cve": "CVE-2019-19537", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19537" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19537", "url": "https://www.suse.com/security/cve/CVE-2019-19537" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-19537", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-19537", "url": "https://bugzilla.suse.com/1158834" }, { "category": "external", "summary": "SUSE Bug 1158904 for CVE-2019-19537", "url": "https://bugzilla.suse.com/1158904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19537" }, { "cve": "CVE-2019-19543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19543" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1.6, there is a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19543", "url": "https://www.suse.com/security/cve/CVE-2019-19543" }, { "category": "external", "summary": "SUSE Bug 1158427 for CVE-2019-19543", "url": "https://bugzilla.suse.com/1158427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "low" } ], "title": "CVE-2019-19543" }, { "cve": "CVE-2019-19767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19767" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19767", "url": "https://www.suse.com/security/cve/CVE-2019-19767" }, { "category": "external", "summary": "SUSE Bug 1159297 for CVE-2019-19767", "url": "https://bugzilla.suse.com/1159297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19767" }, { "cve": "CVE-2019-19965", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19965" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19965", "url": "https://www.suse.com/security/cve/CVE-2019-19965" }, { "category": "external", "summary": "SUSE Bug 1159911 for CVE-2019-19965", "url": "https://bugzilla.suse.com/1159911" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-19965" }, { "cve": "CVE-2019-19966", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19966" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19966", "url": "https://www.suse.com/security/cve/CVE-2019-19966" }, { "category": "external", "summary": "SUSE Bug 1159841 for CVE-2019-19966", "url": "https://bugzilla.suse.com/1159841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "low" } ], "title": "CVE-2019-19966" }, { "cve": "CVE-2019-20054", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20054" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20054", "url": "https://www.suse.com/security/cve/CVE-2019-20054" }, { "category": "external", "summary": "SUSE Bug 1159910 for CVE-2019-20054", "url": "https://bugzilla.suse.com/1159910" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-20054" }, { "cve": "CVE-2019-20095", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20095" } ], "notes": [ { "category": "general", "text": "mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c in the Linux kernel before 5.1.6 has some error-handling cases that did not free allocated hostcmd memory, aka CID-003b686ace82. This will cause a memory leak and denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20095", "url": "https://www.suse.com/security/cve/CVE-2019-20095" }, { "category": "external", "summary": "SUSE Bug 1159909 for CVE-2019-20095", "url": "https://bugzilla.suse.com/1159909" }, { "category": "external", "summary": "SUSE Bug 1159914 for CVE-2019-20095", "url": "https://bugzilla.suse.com/1159914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "important" } ], "title": "CVE-2019-20095" }, { "cve": "CVE-2019-20096", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20096" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20096", "url": "https://www.suse.com/security/cve/CVE-2019-20096" }, { "category": "external", "summary": "SUSE Bug 1159908 for CVE-2019-20096", "url": "https://bugzilla.suse.com/1159908" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2019-20096" }, { "cve": "CVE-2020-7053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-7053" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.14 longterm through 4.14.165 and 4.19 longterm through 4.19.96 (and 5.x before 5.2), there is a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c. This is related to i915_gem_context_destroy_ioctl in drivers/gpu/drm/i915/i915_gem_context.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-7053", "url": "https://www.suse.com/security/cve/CVE-2020-7053" }, { "category": "external", "summary": "SUSE Bug 1160966 for CVE-2020-7053", "url": "https://bugzilla.suse.com/1160966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.12.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.12.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-03-05T15:16:11Z", "details": "moderate" } ], "title": "CVE-2020-7053" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…