suse-su-2021:1617-1
Vulnerability from csaf_suse
Published
2021-05-17 09:19
Modified
2021-05-17 09:19
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-36312: Fixed an issue in virt/kvm/kvm_main.c that had a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure (bnc#1184509).
- CVE-2021-29650: Fixed an issue inside the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).
- CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bnc#1184391).
- CVE-2020-25673: Fixed NFC endless loops caused by repeated llcp_sock_connect() (bsc#1178181).
- CVE-2020-25672: Fixed NFC memory leak in llcp_sock_connect() (bsc#1178181).
- CVE-2020-25671: Fixed NFC refcount leak in llcp_sock_connect() (bsc#1178181).
- CVE-2020-25670: Fixed NFC refcount leak in llcp_sock_bind() (bsc#1178181).
- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h where a 'stall on CPU' could have occured because a retry loop continually finds the same bad inode (bnc#1184194, bnc#1184211).
- CVE-2021-30002: Fixed a memory leak issue when a webcam device exists (bnc#1184120).
- CVE-2021-3483: Fixed a use-after-free bug in nosy_ioctl() (bsc#1184393).
- CVE-2021-20219: Fixed a denial of service vulnerability in drivers/tty/n_tty.c of the Linux kernel. In this flaw a local attacker with a normal user privilege could have delayed the loop and cause a threat to the system availability (bnc#1184397).
- CVE-2021-29265: Fixed an issue in usbip_sockfd_store in drivers/usb/usbip/stub_dev.c that allowed attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status (bnc#1184167).
- CVE-2021-29264: Fixed an issue in drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver that allowed attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled (bnc#1184168).
- CVE-2021-28972: Fixed an issue in drivers/pci/hotplug/rpadlpar_sysfs.c where the RPA PCI Hotplug driver had a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name '\0' termination (bnc#1184198).
- CVE-2021-28660: Fixed rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c that allowed writing beyond the end of the ssid array (bnc#1183593).
- CVE-2020-0433: Fixed blk_mq_queue_tag_busy_iter of blk-mq-tag.c, where a possible use after free due to improper locking could have happened. This could have led to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1176720).
- CVE-2021-27365: Fixed an issue inside the iSCSI data structures that does not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bnc#1182715).
- CVE-2021-27363: Fixed an issue with a kernel pointer leak that could have been used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables (bnc#1182716).
- CVE-2021-27364: Fixed an issue in drivers/scsi/scsi_transport_iscsi.c where an unprivileged user can craft Netlink messages (bnc#1182717).
- CVE-2020-36322: Fixed an issue in the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bnc#1184211 bnc#1184952).
- CVE-2021-28038: Fixed an issue with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931 (bnc#1183022 bnc#1183069 ).
- CVE-2020-1749: Fixed a flaw with some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality (bnc#1165629).
The following non-security bugs were fixed:
- KVM: Add proper lockdep assertion in I/O bus unregister (bsc#1185555).
- KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU (bsc#1185556).
- KVM: Stop looking for coalesced MMIO zones if the bus is destroyed (bsc#1185557).
- Xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367).
- bluetooth: eliminate the potential race condition when removing the HCI controller (bsc#1184611).
- ext4: check journal inode extents more carefully (bsc#1173485).
- ext4: do not allow overlapping system zones (bsc#1173485).
- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).
- xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367).
Patchnames
SUSE-2021-1617,SUSE-SLE-SERVER-12-SP2-BCL-2021-1617,SUSE-SLE-SERVER-12-SP2-LTSS-ERICSSON-2021-1617,SUSE-SLE-SERVER-12-SP2-LTSS-SAP-2021-1617
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-36312: Fixed an issue in virt/kvm/kvm_main.c that had a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure (bnc#1184509).\n- CVE-2021-29650: Fixed an issue inside the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).\n- CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bnc#1184391).\n- CVE-2020-25673: Fixed NFC endless loops caused by repeated llcp_sock_connect() (bsc#1178181).\n- CVE-2020-25672: Fixed NFC memory leak in llcp_sock_connect() (bsc#1178181).\n- CVE-2020-25671: Fixed NFC refcount leak in llcp_sock_connect() (bsc#1178181).\n- CVE-2020-25670: Fixed NFC refcount leak in llcp_sock_bind() (bsc#1178181).\n- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h where a \u0027stall on CPU\u0027 could have occured because a retry loop continually finds the same bad inode (bnc#1184194, bnc#1184211).\n- CVE-2021-30002: Fixed a memory leak issue when a webcam device exists (bnc#1184120).\n- CVE-2021-3483: Fixed a use-after-free bug in nosy_ioctl() (bsc#1184393).\n- CVE-2021-20219: Fixed a denial of service vulnerability in drivers/tty/n_tty.c of the Linux kernel. In this flaw a local attacker with a normal user privilege could have delayed the loop and cause a threat to the system availability (bnc#1184397).\n- CVE-2021-29265: Fixed an issue in usbip_sockfd_store in drivers/usb/usbip/stub_dev.c that allowed attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status (bnc#1184167).\n- CVE-2021-29264: Fixed an issue in drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver that allowed attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled (bnc#1184168).\n- CVE-2021-28972: Fixed an issue in drivers/pci/hotplug/rpadlpar_sysfs.c where the RPA PCI Hotplug driver had a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name \u0027\\0\u0027 termination (bnc#1184198).\n- CVE-2021-28660: Fixed rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c that allowed writing beyond the end of the ssid array (bnc#1183593).\n- CVE-2020-0433: Fixed blk_mq_queue_tag_busy_iter of blk-mq-tag.c, where a possible use after free due to improper locking could have happened. This could have led to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1176720).\n- CVE-2021-27365: Fixed an issue inside the iSCSI data structures that does not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bnc#1182715).\n- CVE-2021-27363: Fixed an issue with a kernel pointer leak that could have been used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport\u0027s handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module\u0027s global variables (bnc#1182716).\n- CVE-2021-27364: Fixed an issue in drivers/scsi/scsi_transport_iscsi.c where an unprivileged user can craft Netlink messages (bnc#1182717).\n- CVE-2020-36322: Fixed an issue in the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bnc#1184211 bnc#1184952).\n- CVE-2021-28038: Fixed an issue with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931 (bnc#1183022 bnc#1183069 ).\n- CVE-2020-1749: Fixed a flaw with some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality (bnc#1165629).\n\nThe following non-security bugs were fixed:\n\n- KVM: Add proper lockdep assertion in I/O bus unregister (bsc#1185555).\n- KVM: Destroy I/O bus devices on unregister failure _after_ sync\u0027ing SRCU (bsc#1185556).\n- KVM: Stop looking for coalesced MMIO zones if the bus is destroyed (bsc#1185557).\n- Xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367).\n- bluetooth: eliminate the potential race condition when removing the HCI controller (bsc#1184611).\n- ext4: check journal inode extents more carefully (bsc#1173485).\n- ext4: do not allow overlapping system zones (bsc#1173485).\n- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).\n- xen-netback: respect gnttab_map_refs()\u0027s return value (bsc#1183022 XSA-367).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-1617,SUSE-SLE-SERVER-12-SP2-BCL-2021-1617,SUSE-SLE-SERVER-12-SP2-LTSS-ERICSSON-2021-1617,SUSE-SLE-SERVER-12-SP2-LTSS-SAP-2021-1617", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1617-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:1617-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211617-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:1617-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" }, { "category": "self", "summary": "SUSE Bug 1165629", "url": "https://bugzilla.suse.com/1165629" }, { "category": "self", "summary": "SUSE Bug 1173485", "url": "https://bugzilla.suse.com/1173485" }, { "category": "self", "summary": "SUSE Bug 1176720", "url": "https://bugzilla.suse.com/1176720" }, { "category": "self", "summary": "SUSE Bug 1178181", "url": "https://bugzilla.suse.com/1178181" }, { "category": "self", "summary": "SUSE Bug 1182715", "url": "https://bugzilla.suse.com/1182715" }, { "category": "self", "summary": "SUSE Bug 1182716", "url": "https://bugzilla.suse.com/1182716" }, { "category": "self", "summary": "SUSE Bug 1182717", "url": "https://bugzilla.suse.com/1182717" }, { "category": "self", "summary": "SUSE Bug 1183022", "url": "https://bugzilla.suse.com/1183022" }, { "category": "self", "summary": "SUSE Bug 1183069", "url": "https://bugzilla.suse.com/1183069" }, { "category": "self", "summary": "SUSE Bug 1183593", "url": "https://bugzilla.suse.com/1183593" }, { "category": "self", "summary": "SUSE Bug 1184120", "url": "https://bugzilla.suse.com/1184120" }, { "category": "self", "summary": "SUSE Bug 1184167", "url": "https://bugzilla.suse.com/1184167" }, { "category": "self", "summary": "SUSE Bug 1184168", "url": "https://bugzilla.suse.com/1184168" }, { "category": "self", "summary": "SUSE Bug 1184194", "url": "https://bugzilla.suse.com/1184194" }, { "category": "self", "summary": "SUSE Bug 1184198", "url": "https://bugzilla.suse.com/1184198" }, { "category": "self", "summary": "SUSE Bug 1184208", "url": "https://bugzilla.suse.com/1184208" }, { "category": "self", "summary": "SUSE Bug 1184211", "url": "https://bugzilla.suse.com/1184211" }, { "category": "self", "summary": "SUSE Bug 1184391", "url": "https://bugzilla.suse.com/1184391" }, { "category": "self", "summary": "SUSE Bug 1184393", "url": "https://bugzilla.suse.com/1184393" }, { "category": "self", "summary": "SUSE Bug 1184397", "url": "https://bugzilla.suse.com/1184397" }, { "category": "self", "summary": "SUSE Bug 1184509", "url": "https://bugzilla.suse.com/1184509" }, { "category": "self", "summary": "SUSE Bug 1184611", "url": "https://bugzilla.suse.com/1184611" }, { "category": "self", "summary": "SUSE Bug 1184952", "url": "https://bugzilla.suse.com/1184952" }, { "category": "self", "summary": "SUSE Bug 1185555", "url": "https://bugzilla.suse.com/1185555" }, { "category": "self", "summary": "SUSE Bug 1185556", "url": "https://bugzilla.suse.com/1185556" }, { "category": "self", "summary": "SUSE Bug 1185557", "url": "https://bugzilla.suse.com/1185557" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0433 page", "url": "https://www.suse.com/security/cve/CVE-2020-0433/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1749 page", "url": "https://www.suse.com/security/cve/CVE-2020-1749/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25670 page", "url": "https://www.suse.com/security/cve/CVE-2020-25670/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25671 page", "url": "https://www.suse.com/security/cve/CVE-2020-25671/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25672 page", "url": "https://www.suse.com/security/cve/CVE-2020-25672/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25673 page", "url": "https://www.suse.com/security/cve/CVE-2020-25673/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-36312 page", "url": "https://www.suse.com/security/cve/CVE-2020-36312/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-36322 page", "url": "https://www.suse.com/security/cve/CVE-2020-36322/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-20219 page", "url": "https://www.suse.com/security/cve/CVE-2021-20219/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-27363 page", "url": "https://www.suse.com/security/cve/CVE-2021-27363/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-27364 page", "url": "https://www.suse.com/security/cve/CVE-2021-27364/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-27365 page", "url": "https://www.suse.com/security/cve/CVE-2021-27365/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-28038 page", "url": "https://www.suse.com/security/cve/CVE-2021-28038/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-28660 page", "url": "https://www.suse.com/security/cve/CVE-2021-28660/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-28950 page", "url": "https://www.suse.com/security/cve/CVE-2021-28950/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-28972 page", "url": "https://www.suse.com/security/cve/CVE-2021-28972/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-29154 page", "url": "https://www.suse.com/security/cve/CVE-2021-29154/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-29264 page", "url": "https://www.suse.com/security/cve/CVE-2021-29264/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-29265 page", "url": "https://www.suse.com/security/cve/CVE-2021-29265/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-29650 page", "url": "https://www.suse.com/security/cve/CVE-2021-29650/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30002 page", "url": "https://www.suse.com/security/cve/CVE-2021-30002/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3483 page", "url": "https://www.suse.com/security/cve/CVE-2021-3483/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2021-05-17T09:19:30Z", "generator": { "date": "2021-05-17T09:19:30Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:1617-1", "initial_release_date": "2021-05-17T09:19:30Z", "revision_history": [ { "date": "2021-05-17T09:19:30Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.155.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.155.1.aarch64", "product_id": "cluster-md-kmp-default-4.4.121-92.155.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.155.1.aarch64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.155.1.aarch64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.155.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.155.1.aarch64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.155.1.aarch64", "product_id": "cluster-network-kmp-default-4.4.121-92.155.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.155.1.aarch64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.155.1.aarch64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.155.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.155.1.aarch64", "product": { "name": "dlm-kmp-default-4.4.121-92.155.1.aarch64", "product_id": "dlm-kmp-default-4.4.121-92.155.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.155.1.aarch64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.155.1.aarch64", "product_id": "dlm-kmp-vanilla-4.4.121-92.155.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.155.1.aarch64", "product": { "name": "gfs2-kmp-default-4.4.121-92.155.1.aarch64", "product_id": "gfs2-kmp-default-4.4.121-92.155.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.155.1.aarch64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.155.1.aarch64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.155.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.155.1.aarch64", "product": { "name": "kernel-default-4.4.121-92.155.1.aarch64", "product_id": "kernel-default-4.4.121-92.155.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.155.1.aarch64", "product": { "name": "kernel-default-base-4.4.121-92.155.1.aarch64", "product_id": "kernel-default-base-4.4.121-92.155.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.155.1.aarch64", "product": { "name": "kernel-default-devel-4.4.121-92.155.1.aarch64", "product_id": "kernel-default-devel-4.4.121-92.155.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.155.1.aarch64", "product": { "name": "kernel-default-extra-4.4.121-92.155.1.aarch64", "product_id": "kernel-default-extra-4.4.121-92.155.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.155.1.aarch64", "product": { "name": "kernel-default-kgraft-4.4.121-92.155.1.aarch64", "product_id": "kernel-default-kgraft-4.4.121-92.155.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.155.1.aarch64", "product": { "name": "kernel-obs-build-4.4.121-92.155.1.aarch64", "product_id": "kernel-obs-build-4.4.121-92.155.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.155.1.aarch64", "product": { "name": "kernel-obs-qa-4.4.121-92.155.1.aarch64", "product_id": "kernel-obs-qa-4.4.121-92.155.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.155.1.aarch64", "product": { "name": "kernel-syms-4.4.121-92.155.1.aarch64", "product_id": "kernel-syms-4.4.121-92.155.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.155.1.aarch64", "product": { "name": "kernel-vanilla-4.4.121-92.155.1.aarch64", "product_id": "kernel-vanilla-4.4.121-92.155.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.155.1.aarch64", "product": { "name": "kernel-vanilla-base-4.4.121-92.155.1.aarch64", "product_id": "kernel-vanilla-base-4.4.121-92.155.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.155.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.155.1.aarch64", "product_id": "kernel-vanilla-devel-4.4.121-92.155.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.155.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.155.1.aarch64", "product_id": "ocfs2-kmp-default-4.4.121-92.155.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.155.1.aarch64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.155.1.aarch64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.155.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.121-92.155.1.noarch", "product": { "name": "kernel-devel-4.4.121-92.155.1.noarch", "product_id": "kernel-devel-4.4.121-92.155.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.121-92.155.1.noarch", "product": { "name": "kernel-docs-4.4.121-92.155.1.noarch", "product_id": "kernel-docs-4.4.121-92.155.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.4.121-92.155.1.noarch", "product": { "name": "kernel-docs-html-4.4.121-92.155.1.noarch", "product_id": "kernel-docs-html-4.4.121-92.155.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.4.121-92.155.1.noarch", "product": { "name": "kernel-docs-pdf-4.4.121-92.155.1.noarch", "product_id": "kernel-docs-pdf-4.4.121-92.155.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.121-92.155.1.noarch", "product": { "name": "kernel-macros-4.4.121-92.155.1.noarch", "product_id": "kernel-macros-4.4.121-92.155.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.121-92.155.1.noarch", "product": { "name": "kernel-source-4.4.121-92.155.1.noarch", "product_id": "kernel-source-4.4.121-92.155.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.4.121-92.155.1.noarch", "product": { "name": "kernel-source-vanilla-4.4.121-92.155.1.noarch", "product_id": "kernel-source-vanilla-4.4.121-92.155.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.155.1.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.155.1.ppc64le", "product_id": "cluster-md-kmp-debug-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.155.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.121-92.155.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.155.1.ppc64le", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.155.1.ppc64le", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.155.1.ppc64le", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.155.1.ppc64le", "product_id": "cluster-network-kmp-debug-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.155.1.ppc64le", "product": { "name": "cluster-network-kmp-default-4.4.121-92.155.1.ppc64le", "product_id": "cluster-network-kmp-default-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.155.1.ppc64le", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.155.1.ppc64le", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.155.1.ppc64le", "product": { "name": "dlm-kmp-debug-4.4.121-92.155.1.ppc64le", "product_id": "dlm-kmp-debug-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.155.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.121-92.155.1.ppc64le", "product_id": "dlm-kmp-default-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.155.1.ppc64le", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.155.1.ppc64le", "product_id": "dlm-kmp-vanilla-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.155.1.ppc64le", "product": { "name": "gfs2-kmp-debug-4.4.121-92.155.1.ppc64le", "product_id": "gfs2-kmp-debug-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.155.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.121-92.155.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.155.1.ppc64le", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.155.1.ppc64le", "product_id": "gfs2-kmp-vanilla-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.155.1.ppc64le", "product": { "name": "kernel-debug-4.4.121-92.155.1.ppc64le", "product_id": "kernel-debug-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.155.1.ppc64le", "product": { "name": "kernel-debug-base-4.4.121-92.155.1.ppc64le", "product_id": "kernel-debug-base-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.155.1.ppc64le", "product": { "name": "kernel-debug-devel-4.4.121-92.155.1.ppc64le", "product_id": "kernel-debug-devel-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.155.1.ppc64le", "product": { "name": "kernel-debug-extra-4.4.121-92.155.1.ppc64le", "product_id": "kernel-debug-extra-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.155.1.ppc64le", "product": { "name": "kernel-debug-kgraft-4.4.121-92.155.1.ppc64le", "product_id": "kernel-debug-kgraft-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.155.1.ppc64le", "product": { "name": "kernel-default-4.4.121-92.155.1.ppc64le", "product_id": "kernel-default-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.155.1.ppc64le", "product": { "name": "kernel-default-base-4.4.121-92.155.1.ppc64le", "product_id": "kernel-default-base-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.155.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.121-92.155.1.ppc64le", "product_id": "kernel-default-devel-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.155.1.ppc64le", "product": { "name": "kernel-default-extra-4.4.121-92.155.1.ppc64le", "product_id": "kernel-default-extra-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.155.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.4.121-92.155.1.ppc64le", "product_id": "kernel-default-kgraft-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.155.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.121-92.155.1.ppc64le", "product_id": "kernel-obs-build-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.155.1.ppc64le", "product": { "name": "kernel-obs-qa-4.4.121-92.155.1.ppc64le", "product_id": "kernel-obs-qa-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.155.1.ppc64le", "product": { "name": "kernel-syms-4.4.121-92.155.1.ppc64le", "product_id": "kernel-syms-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.155.1.ppc64le", "product": { "name": "kernel-vanilla-4.4.121-92.155.1.ppc64le", "product_id": "kernel-vanilla-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.155.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.4.121-92.155.1.ppc64le", "product_id": "kernel-vanilla-base-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.155.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.4.121-92.155.1.ppc64le", "product_id": "kernel-vanilla-devel-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.155.1.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.155.1.ppc64le", "product_id": "ocfs2-kmp-debug-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.155.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.121-92.155.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.121-92.155.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.155.1.ppc64le", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.155.1.ppc64le", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.155.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.155.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.121-92.155.1.s390x", "product_id": "cluster-md-kmp-default-4.4.121-92.155.1.s390x" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.155.1.s390x", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.155.1.s390x", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.155.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.155.1.s390x", "product": { "name": "cluster-network-kmp-default-4.4.121-92.155.1.s390x", "product_id": "cluster-network-kmp-default-4.4.121-92.155.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.155.1.s390x", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.155.1.s390x", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.155.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.155.1.s390x", "product": { "name": "dlm-kmp-default-4.4.121-92.155.1.s390x", "product_id": "dlm-kmp-default-4.4.121-92.155.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.155.1.s390x", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.155.1.s390x", "product_id": "dlm-kmp-vanilla-4.4.121-92.155.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.155.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.121-92.155.1.s390x", "product_id": "gfs2-kmp-default-4.4.121-92.155.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.155.1.s390x", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.155.1.s390x", "product_id": "gfs2-kmp-vanilla-4.4.121-92.155.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.155.1.s390x", "product": { "name": "kernel-default-4.4.121-92.155.1.s390x", "product_id": "kernel-default-4.4.121-92.155.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.155.1.s390x", "product": { "name": "kernel-default-base-4.4.121-92.155.1.s390x", "product_id": "kernel-default-base-4.4.121-92.155.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.155.1.s390x", "product": { "name": "kernel-default-devel-4.4.121-92.155.1.s390x", "product_id": "kernel-default-devel-4.4.121-92.155.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.155.1.s390x", "product": { "name": "kernel-default-extra-4.4.121-92.155.1.s390x", "product_id": "kernel-default-extra-4.4.121-92.155.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.155.1.s390x", "product": { "name": "kernel-default-kgraft-4.4.121-92.155.1.s390x", "product_id": "kernel-default-kgraft-4.4.121-92.155.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.121-92.155.1.s390x", "product": { "name": "kernel-default-man-4.4.121-92.155.1.s390x", "product_id": "kernel-default-man-4.4.121-92.155.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.155.1.s390x", "product": { "name": "kernel-obs-build-4.4.121-92.155.1.s390x", "product_id": "kernel-obs-build-4.4.121-92.155.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.155.1.s390x", "product": { "name": "kernel-obs-qa-4.4.121-92.155.1.s390x", "product_id": "kernel-obs-qa-4.4.121-92.155.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.155.1.s390x", "product": { "name": "kernel-syms-4.4.121-92.155.1.s390x", "product_id": "kernel-syms-4.4.121-92.155.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.155.1.s390x", "product": { "name": "kernel-vanilla-4.4.121-92.155.1.s390x", "product_id": "kernel-vanilla-4.4.121-92.155.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.155.1.s390x", "product": { "name": "kernel-vanilla-base-4.4.121-92.155.1.s390x", "product_id": "kernel-vanilla-base-4.4.121-92.155.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.155.1.s390x", "product": { "name": "kernel-vanilla-devel-4.4.121-92.155.1.s390x", "product_id": "kernel-vanilla-devel-4.4.121-92.155.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.4.121-92.155.1.s390x", "product": { "name": "kernel-zfcpdump-4.4.121-92.155.1.s390x", "product_id": "kernel-zfcpdump-4.4.121-92.155.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.155.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.121-92.155.1.s390x", "product_id": "ocfs2-kmp-default-4.4.121-92.155.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.155.1.s390x", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.155.1.s390x", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.155.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.155.1.x86_64", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.155.1.x86_64", "product_id": "cluster-md-kmp-debug-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.155.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.155.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.155.1.x86_64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.155.1.x86_64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.155.1.x86_64", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.155.1.x86_64", "product_id": "cluster-network-kmp-debug-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.155.1.x86_64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.155.1.x86_64", "product_id": "cluster-network-kmp-default-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.155.1.x86_64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.155.1.x86_64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.155.1.x86_64", "product": { "name": "dlm-kmp-debug-4.4.121-92.155.1.x86_64", "product_id": "dlm-kmp-debug-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.155.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.121-92.155.1.x86_64", "product_id": "dlm-kmp-default-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.155.1.x86_64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.155.1.x86_64", "product_id": "dlm-kmp-vanilla-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.155.1.x86_64", "product": { "name": "gfs2-kmp-debug-4.4.121-92.155.1.x86_64", "product_id": "gfs2-kmp-debug-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.155.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.121-92.155.1.x86_64", "product_id": "gfs2-kmp-default-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.155.1.x86_64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.155.1.x86_64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.155.1.x86_64", "product": { "name": "kernel-debug-4.4.121-92.155.1.x86_64", "product_id": "kernel-debug-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.155.1.x86_64", "product": { "name": "kernel-debug-base-4.4.121-92.155.1.x86_64", "product_id": "kernel-debug-base-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.155.1.x86_64", "product": { "name": "kernel-debug-devel-4.4.121-92.155.1.x86_64", "product_id": "kernel-debug-devel-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.155.1.x86_64", "product": { "name": "kernel-debug-extra-4.4.121-92.155.1.x86_64", "product_id": "kernel-debug-extra-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.155.1.x86_64", "product": { "name": "kernel-debug-kgraft-4.4.121-92.155.1.x86_64", "product_id": "kernel-debug-kgraft-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.155.1.x86_64", "product": { "name": "kernel-default-4.4.121-92.155.1.x86_64", "product_id": "kernel-default-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.155.1.x86_64", "product": { "name": "kernel-default-base-4.4.121-92.155.1.x86_64", "product_id": "kernel-default-base-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.155.1.x86_64", "product": { "name": "kernel-default-devel-4.4.121-92.155.1.x86_64", "product_id": "kernel-default-devel-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.155.1.x86_64", "product": { "name": "kernel-default-extra-4.4.121-92.155.1.x86_64", "product_id": "kernel-default-extra-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.155.1.x86_64", "product": { "name": "kernel-default-kgraft-4.4.121-92.155.1.x86_64", "product_id": "kernel-default-kgraft-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.155.1.x86_64", "product": { "name": "kernel-obs-build-4.4.121-92.155.1.x86_64", "product_id": "kernel-obs-build-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.155.1.x86_64", "product": { "name": "kernel-obs-qa-4.4.121-92.155.1.x86_64", "product_id": "kernel-obs-qa-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.155.1.x86_64", "product": { "name": "kernel-syms-4.4.121-92.155.1.x86_64", "product_id": "kernel-syms-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.155.1.x86_64", "product": { "name": "kernel-vanilla-4.4.121-92.155.1.x86_64", "product_id": "kernel-vanilla-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.155.1.x86_64", "product": { "name": "kernel-vanilla-base-4.4.121-92.155.1.x86_64", "product_id": "kernel-vanilla-base-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.155.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.155.1.x86_64", "product_id": "kernel-vanilla-devel-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.155.1.x86_64", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.155.1.x86_64", "product_id": "ocfs2-kmp-debug-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.155.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.155.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.121-92.155.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.155.1.x86_64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.155.1.x86_64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.155.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.155.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.155.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.155.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.155.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.155.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.155.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.155.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.155.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.155.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.155.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.155.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.155.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.155.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.155.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0433", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0433" } ], "notes": [ { "category": "general", "text": "In blk_mq_queue_tag_busy_iter of blk-mq-tag.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-151939299", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0433", "url": "https://www.suse.com/security/cve/CVE-2020-0433" }, { "category": "external", "summary": "SUSE Bug 1176720 for CVE-2020-0433", "url": "https://bugzilla.suse.com/1176720" }, { "category": "external", "summary": "SUSE Bug 1178066 for CVE-2020-0433", "url": "https://bugzilla.suse.com/1178066" }, { "category": "external", "summary": "SUSE Bug 1187135 for CVE-2020-0433", "url": "https://bugzilla.suse.com/1187135" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2020-0433", "url": "https://bugzilla.suse.com/1189302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-17T09:19:30Z", "details": "important" } ], "title": "CVE-2020-0433" }, { "cve": "CVE-2020-1749", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1749" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1749", "url": "https://www.suse.com/security/cve/CVE-2020-1749" }, { "category": "external", "summary": "SUSE Bug 1165629 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165629" }, { "category": "external", "summary": "SUSE Bug 1165631 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165631" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177513" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1189302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-17T09:19:30Z", "details": "important" } ], "title": "CVE-2020-1749" }, { "cve": "CVE-2020-25670", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25670" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in Linux Kernel where refcount leak in llcp_sock_bind() causing use-after-free which might lead to privilege escalations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25670", "url": "https://www.suse.com/security/cve/CVE-2020-25670" }, { "category": "external", "summary": "SUSE Bug 1178181 for CVE-2020-25670", "url": "https://bugzilla.suse.com/1178181" }, { "category": "external", "summary": "SUSE Bug 1194680 for CVE-2020-25670", "url": "https://bugzilla.suse.com/1194680" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-17T09:19:30Z", "details": "important" } ], "title": "CVE-2020-25670" }, { "cve": "CVE-2020-25671", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25671" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25671", "url": "https://www.suse.com/security/cve/CVE-2020-25671" }, { "category": "external", "summary": "SUSE Bug 1178181 for CVE-2020-25671", "url": "https://bugzilla.suse.com/1178181" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-17T09:19:30Z", "details": "important" } ], "title": "CVE-2020-25671" }, { "cve": "CVE-2020-25672", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25672" } ], "notes": [ { "category": "general", "text": "A memory leak vulnerability was found in Linux kernel in llcp_sock_connect", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25672", "url": "https://www.suse.com/security/cve/CVE-2020-25672" }, { "category": "external", "summary": "SUSE Bug 1178181 for CVE-2020-25672", "url": "https://bugzilla.suse.com/1178181" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-17T09:19:30Z", "details": "important" } ], "title": "CVE-2020-25672" }, { "cve": "CVE-2020-25673", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25673" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25673", "url": "https://www.suse.com/security/cve/CVE-2020-25673" }, { "category": "external", "summary": "SUSE Bug 1178181 for CVE-2020-25673", "url": "https://bugzilla.suse.com/1178181" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-17T09:19:30Z", "details": "important" } ], "title": "CVE-2020-25673" }, { "cve": "CVE-2020-36312", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-36312" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.8.10. virt/kvm/kvm_main.c has a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure, aka CID-f65886606c2d.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-36312", "url": "https://www.suse.com/security/cve/CVE-2020-36312" }, { "category": "external", "summary": "SUSE Bug 1184509 for CVE-2020-36312", "url": "https://bugzilla.suse.com/1184509" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-17T09:19:30Z", "details": "low" } ], "title": "CVE-2020-36312" }, { "cve": "CVE-2020-36322", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-36322" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-36322", "url": "https://www.suse.com/security/cve/CVE-2020-36322" }, { "category": "external", "summary": "SUSE Bug 1184211 for CVE-2020-36322", "url": "https://bugzilla.suse.com/1184211" }, { "category": "external", "summary": "SUSE Bug 1184952 for CVE-2020-36322", "url": "https://bugzilla.suse.com/1184952" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2020-36322", "url": "https://bugzilla.suse.com/1189302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-17T09:19:30Z", "details": "important" } ], "title": "CVE-2020-36322" }, { "cve": "CVE-2021-20219", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-20219" } ], "notes": [ { "category": "general", "text": "A denial of service vulnerability was found in n_tty_receive_char_special in drivers/tty/n_tty.c of the Linux kernel. In this flaw a local attacker with a normal user privilege could delay the loop (due to a changing ldata-\u003eread_head, and a missing sanity check) and cause a threat to the system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-20219", "url": "https://www.suse.com/security/cve/CVE-2021-20219" }, { "category": "external", "summary": "SUSE Bug 1184397 for CVE-2021-20219", "url": "https://bugzilla.suse.com/1184397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-17T09:19:30Z", "details": "moderate" } ], "title": "CVE-2021-20219" }, { "cve": "CVE-2021-27363", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-27363" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport\u0027s handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module\u0027s global variables.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-27363", "url": "https://www.suse.com/security/cve/CVE-2021-27363" }, { "category": "external", "summary": "SUSE Bug 1182716 for CVE-2021-27363", "url": "https://bugzilla.suse.com/1182716" }, { "category": "external", "summary": "SUSE Bug 1182717 for CVE-2021-27363", "url": "https://bugzilla.suse.com/1182717" }, { "category": "external", "summary": "SUSE Bug 1183120 for CVE-2021-27363", "url": "https://bugzilla.suse.com/1183120" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2021-27363", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-17T09:19:30Z", "details": "important" } ], "title": "CVE-2021-27363" }, { "cve": "CVE-2021-27364", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-27364" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-27364", "url": "https://www.suse.com/security/cve/CVE-2021-27364" }, { "category": "external", "summary": "SUSE Bug 1182715 for CVE-2021-27364", "url": "https://bugzilla.suse.com/1182715" }, { "category": "external", "summary": "SUSE Bug 1182716 for CVE-2021-27364", "url": "https://bugzilla.suse.com/1182716" }, { "category": "external", "summary": "SUSE Bug 1182717 for CVE-2021-27364", "url": "https://bugzilla.suse.com/1182717" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2021-27364", "url": "https://bugzilla.suse.com/1200084" }, { "category": "external", "summary": "SUSE Bug 1214268 for CVE-2021-27364", "url": "https://bugzilla.suse.com/1214268" }, { "category": "external", "summary": "SUSE Bug 1218966 for CVE-2021-27364", "url": "https://bugzilla.suse.com/1218966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-17T09:19:30Z", "details": "important" } ], "title": "CVE-2021-27364" }, { "cve": "CVE-2021-27365", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-27365" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-27365", "url": "https://www.suse.com/security/cve/CVE-2021-27365" }, { "category": "external", "summary": "SUSE Bug 1182712 for CVE-2021-27365", "url": "https://bugzilla.suse.com/1182712" }, { "category": "external", "summary": "SUSE Bug 1182715 for CVE-2021-27365", "url": "https://bugzilla.suse.com/1182715" }, { "category": "external", "summary": "SUSE Bug 1183491 for CVE-2021-27365", "url": "https://bugzilla.suse.com/1183491" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2021-27365", "url": "https://bugzilla.suse.com/1200084" }, { "category": "external", "summary": "SUSE Bug 1214268 for CVE-2021-27365", "url": "https://bugzilla.suse.com/1214268" }, { "category": "external", "summary": "SUSE Bug 1218966 for CVE-2021-27365", "url": "https://bugzilla.suse.com/1218966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-17T09:19:30Z", "details": "important" } ], "title": "CVE-2021-27365" }, { "cve": "CVE-2021-28038", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-28038" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.11.3, as used with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-28038", "url": "https://www.suse.com/security/cve/CVE-2021-28038" }, { "category": "external", "summary": "SUSE Bug 1183022 for CVE-2021-28038", "url": "https://bugzilla.suse.com/1183022" }, { "category": "external", "summary": "SUSE Bug 1183069 for CVE-2021-28038", "url": "https://bugzilla.suse.com/1183069" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-17T09:19:30Z", "details": "moderate" } ], "title": "CVE-2021-28038" }, { "cve": "CVE-2021-28660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-28660" } ], "notes": [ { "category": "general", "text": "rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the -\u003essid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging issue is relevant to their own customer base.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-28660", "url": "https://www.suse.com/security/cve/CVE-2021-28660" }, { "category": "external", "summary": "SUSE Bug 1183593 for CVE-2021-28660", "url": "https://bugzilla.suse.com/1183593" }, { "category": "external", "summary": "SUSE Bug 1183658 for CVE-2021-28660", "url": "https://bugzilla.suse.com/1183658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-17T09:19:30Z", "details": "important" } ], "title": "CVE-2021-28660" }, { "cve": "CVE-2021-28950", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-28950" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/fuse/fuse_i.h in the Linux kernel before 5.11.8. A \"stall on CPU\" can occur because a retry loop continually finds the same bad inode, aka CID-775c5033a0d1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-28950", "url": "https://www.suse.com/security/cve/CVE-2021-28950" }, { "category": "external", "summary": "SUSE Bug 1184194 for CVE-2021-28950", "url": "https://bugzilla.suse.com/1184194" }, { "category": "external", "summary": "SUSE Bug 1184211 for CVE-2021-28950", "url": "https://bugzilla.suse.com/1184211" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-17T09:19:30Z", "details": "moderate" } ], "title": "CVE-2021-28950" }, { "cve": "CVE-2021-28972", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-28972" } ], "notes": [ { "category": "general", "text": "In drivers/pci/hotplug/rpadlpar_sysfs.c in the Linux kernel through 5.11.8, the RPA PCI Hotplug driver has a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name \u0027\\0\u0027 termination, aka CID-cc7a0bb058b8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-28972", "url": "https://www.suse.com/security/cve/CVE-2021-28972" }, { "category": "external", "summary": "SUSE Bug 1184198 for CVE-2021-28972", "url": "https://bugzilla.suse.com/1184198" }, { "category": "external", "summary": "SUSE Bug 1220060 for CVE-2021-28972", "url": "https://bugzilla.suse.com/1220060" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-17T09:19:30Z", "details": "moderate" } ], "title": "CVE-2021-28972" }, { "cve": "CVE-2021-29154", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-29154" } ], "notes": [ { "category": "general", "text": "BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-29154", "url": "https://www.suse.com/security/cve/CVE-2021-29154" }, { "category": "external", "summary": "SUSE Bug 1184391 for CVE-2021-29154", "url": "https://bugzilla.suse.com/1184391" }, { "category": "external", "summary": "SUSE Bug 1184710 for CVE-2021-29154", "url": "https://bugzilla.suse.com/1184710" }, { "category": "external", "summary": "SUSE Bug 1186408 for CVE-2021-29154", "url": "https://bugzilla.suse.com/1186408" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-17T09:19:30Z", "details": "important" } ], "title": "CVE-2021-29154" }, { "cve": "CVE-2021-29264", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-29264" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.11.10. drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver allows attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled, aka CID-d8861bab48b6.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-29264", "url": "https://www.suse.com/security/cve/CVE-2021-29264" }, { "category": "external", "summary": "SUSE Bug 1184168 for CVE-2021-29264", "url": "https://bugzilla.suse.com/1184168" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-17T09:19:30Z", "details": "moderate" } ], "title": "CVE-2021-29264" }, { "cve": "CVE-2021-29265", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-29265" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.11.7. usbip_sockfd_store in drivers/usb/usbip/stub_dev.c allows attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status, aka CID-9380afd6df70.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-29265", "url": "https://www.suse.com/security/cve/CVE-2021-29265" }, { "category": "external", "summary": "SUSE Bug 1184167 for CVE-2021-29265", "url": "https://bugzilla.suse.com/1184167" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-17T09:19:30Z", "details": "moderate" } ], "title": "CVE-2021-29265" }, { "cve": "CVE-2021-29650", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-29650" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value, aka CID-175e476b8cdf.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-29650", "url": "https://www.suse.com/security/cve/CVE-2021-29650" }, { "category": "external", "summary": "SUSE Bug 1184208 for CVE-2021-29650", "url": "https://bugzilla.suse.com/1184208" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-17T09:19:30Z", "details": "moderate" } ], "title": "CVE-2021-29650" }, { "cve": "CVE-2021-30002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30002" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.11.3 when a webcam device exists. video_usercopy in drivers/media/v4l2-core/v4l2-ioctl.c has a memory leak for large arguments, aka CID-fb18802a338b.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30002", "url": "https://www.suse.com/security/cve/CVE-2021-30002" }, { "category": "external", "summary": "SUSE Bug 1184120 for CVE-2021-30002", "url": "https://bugzilla.suse.com/1184120" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-17T09:19:30Z", "details": "moderate" } ], "title": "CVE-2021-30002" }, { "cve": "CVE-2021-3483", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3483" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3483", "url": "https://www.suse.com/security/cve/CVE-2021-3483" }, { "category": "external", "summary": "SUSE Bug 1184393 for CVE-2021-3483", "url": "https://bugzilla.suse.com/1184393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.155.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.155.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.155.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-05-17T09:19:30Z", "details": "moderate" } ], "title": "CVE-2021-3483" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…